{"id":6243,"date":"2016-06-07T19:09:16","date_gmt":"2016-06-07T18:09:16","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6243"},"modified":"2021-04-09T19:24:28","modified_gmt":"2021-04-09T18:24:28","slug":"do-we-go-overboard-security","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security","title":{"rendered":"Do we go overboard with security?"},"content":{"rendered":"<p>Many clients hate long and complex passwords. They want secure systems, but they don\u2019t want to have to do anything to secure their network \u2013 they want us to do it all. I recently spent an hour with a client answering questions about how secure their data will be once we move it to the cloud. And the very next day, that client asked me to give her a password that\u2019s short and easy to remember.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/toomuchsecurity.jpg\" alt=\"toomuchsecurity.jpg\" width=\"289\" height=\"289\" align=\"right\" hspace=\"5\" \/>We need to work with clients to strike the right balance. Sometimes they are the weakest link. And sometimes we get carried away. Many security experts spend most of their time trying to scare people into compliance. Other times, systems are so locked down that they are essentially unusable for clients.<\/p>\n<p>Our role as IT professionals is to help clients make money, save money, or offer new services through the appropriate use of technology. We should not be viewed as part of the problem, or people who keep the clients from doing their job.<\/p>\n<p>You\u2019ve probably seen some extreme examples where a previous consultant has instituted so many group policy restrictions that you can\u2019t unwrap the spaghetti of overlapping policies to actually help the client get their job done. At the other end of the spectrum, we\u2019ve probably all had a client whose password has been their child\u2019s name \u2013 and they\u2019ve not changed it for the past eight years.<\/p>\n<p>With that in mind, here are five tips for creating a balanced approach to network security.<\/p>\n<h2>1. Create a reasonable password policy \u2013 and enforce it<\/h2>\n<p>As strange as it sounds, managed service providers (MSPs) tend to do two conflicting things with passwords. On one hand, they create draconian password policies (extremely long, complicated passwords that can never be reused, etc.). On the other hand, they make exceptions for the boss, owner, or partners. So the most important people in the company end up with the weakest passwords.<\/p>\n<p>We like to see passwords changed about once a month. That\u2019s 12 a year. To be honest, on a well-secured Windows system you can make this four times a year or maybe even once a year. Passwords should be long enough (10-12 characters minimum), but recent research shows that most of the \u201ccomplicated\u201d requirements are no more effective than just having a longer passphrase. We encourage clients to use two or three simple words with spaces in between and throw in a number here or there.<\/p>\n<p>For example, \u201cSuper Tasty F00d\u201d scores 100% at passwordmeter.com even though it does not have a special character. The random character password \u201cQ1a6qRu!\u201d only scores 82% \u2013 and no one will ever remember it!<\/p>\n<h2>2. Use a good, commercial antivirus program and keep it updated<\/h2>\n<p>Free antivirus programs might be good enough for home use or for very careful clients. But if you spend a lot of time dealing with viruses, you should consider the possibility that your collection of freeware tools is not performing as well as a brand-name for-pay alternative.<\/p>\n<p>In the big picture, no one saves money by using free tools that don\u2019t quite get the job done. If you\u2019re charging clients to maintain their systems, you should use quality tools. The best way for you to save money on this front is to use a tool that\u2019s centrally managed and always up to date.<\/p>\n<h2>3. Never let users log on as administrators. Period<\/h2>\n<p>This gets back to clients wanting everything to be easy and for you to get out of their way so they can do their jobs. But with a modern operating system, properly patched, virtually 100% of viruses require administrative privileges to run. Even with \u201celevated privileges,\u201d a non-administrator cannot install these programs.<\/p>\n<p>You can create a local administrator level account and tell users to put in those credentials if they really need to install something. That way, when something pops up in front of them, they have to stop and think, \u201cDo I really want to do this?\u201d Combine this with some solid user education and the answer will always be \u201cno\u201d.<\/p>\n<h2>4. Perform regular maintenance on firewalls<\/h2>\n<p>Almost no one does this, and I don\u2019t know why. Most routers are \u201cset it and forget it.\u201d But you can\u2019t do that with firewalls. The bad guys aren\u2019t just attacking desktops. The really talented ones are attacking firewalls. That means a) they\u2019re looking for holes that need patching, and b) once they find them, it\u2019s too late.<\/p>\n<p>You probably don\u2019t need to update firewalls every 30 days, but you should look at them at least once per calendar quarter. If you have a business-class firewall, it may have intrusion detection, antivirus, and other add-on features. Those should be updated monthly. When you have a single point of entry, the bad guys have only one way in, and they can pound on it until they succeed.<\/p>\n<h2>5. Keep group policies simple and effective<\/h2>\n<p>Some days, I think group policies are the worst thing ever invented. We\u2019ve taken on new clients who had literally made their server unusable because they had instituted so many complicated group policies. Nowhere else does the KISS principle apply more: Keep it simple!<\/p>\n<p>I\u2019m a big advocate of documentation, so of course we document all group policies at client offices. The first question is:\u00a0<b>Purpose of this policy?<\/b>\u00a0Group policies are a great way to implement the password policy above, or to set account lockout parameters. Managing passwords themselves, however, is a bad idea. Group policies store passwords in a lightly encrypted (easy to crack) format. So don\u2019t use group policies to reset passwords on all the local admin accounts on a domain.<\/p>\n<p>The bottom line on security is that we need to have reasonable, simple policies that result in an effective approach to security. Once you\u2019ve got a handful to simple, easy-to-implement policies, it is very easy to enforce them consistently across all your clients.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The bottom line on security is that we need to have reasonable, simple policies that result in an effective approach to security, says Karl Palachuk.<\/p>\n","protected":false},"author":41,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6243","post","type-post","status-publish","format-standard","hentry","topic-msp-business"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Do we go overboard with security? - N-able<\/title>\n<meta name=\"description\" content=\"The bottom line on security is that we need to have reasonable, simple policies that result in an effective approach to security, says Karl Palachuk.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Do we go overboard with security? - N-able\" \/>\n<meta property=\"og:description\" content=\"The bottom line on security is that we need to have reasonable, simple policies that result in an effective approach to security, says Karl Palachuk.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-07T18:09:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-09T18:24:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/toomuchsecurity.jpg\" \/>\n<meta name=\"author\" content=\"Karl Palachuk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Karl Palachuk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security\"},\"author\":{\"name\":\"Karl Palachuk\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f2c747293642b795bef2dd9ca2c4b1c3\"},\"headline\":\"Do we go overboard with security?\",\"datePublished\":\"2016-06-07T19:09:16+01:00\",\"dateModified\":\"2021-04-09T18:24:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security\"},\"wordCount\":1002,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/toomuchsecurity.jpg\",\"articleSection\":[\"MSP Business\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security\",\"name\":\"Do we go overboard with security? - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/toomuchsecurity.jpg\",\"datePublished\":\"2016-06-07T19:09:16+01:00\",\"dateModified\":\"2021-04-09T18:24:28+00:00\",\"description\":\"The bottom line on security is that we need to have reasonable, simple policies that result in an effective approach to security, says Karl Palachuk.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security#primaryimage\",\"url\":\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/toomuchsecurity.jpg\",\"contentUrl\":\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/toomuchsecurity.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"MSP Business\",\"item\":\"https:\/\/www.n-able.com\/it\/blog\/category\/msp-business\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Do we go overboard with security?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f2c747293642b795bef2dd9ca2c4b1c3\",\"name\":\"Karl Palachuk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/ad565b93f56558978f2cfe3c338b60e069901c986bb4278986319dda2d4d8902?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ad565b93f56558978f2cfe3c338b60e069901c986bb4278986319dda2d4d8902?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ad565b93f56558978f2cfe3c338b60e069901c986bb4278986319dda2d4d8902?s=96&d=mm&r=g\",\"caption\":\"Karl Palachuk\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Do we go overboard with security? - N-able","description":"The bottom line on security is that we need to have reasonable, simple policies that result in an effective approach to security, says Karl Palachuk.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security","og_locale":"it_IT","og_type":"article","og_title":"Do we go overboard with security? - N-able","og_description":"The bottom line on security is that we need to have reasonable, simple policies that result in an effective approach to security, says Karl Palachuk.","og_url":"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2016-06-07T18:09:16+00:00","article_modified_time":"2021-04-09T18:24:28+00:00","og_image":[{"url":"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/toomuchsecurity.jpg","type":"","width":"","height":""}],"author":"Karl Palachuk","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"Karl Palachuk","Tempo di lettura stimato":"5 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security"},"author":{"name":"Karl Palachuk","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f2c747293642b795bef2dd9ca2c4b1c3"},"headline":"Do we go overboard with security?","datePublished":"2016-06-07T19:09:16+01:00","dateModified":"2021-04-09T18:24:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security"},"wordCount":1002,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security#primaryimage"},"thumbnailUrl":"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/toomuchsecurity.jpg","articleSection":["MSP Business"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security","url":"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security","name":"Do we go overboard with security? - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security#primaryimage"},"thumbnailUrl":"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/toomuchsecurity.jpg","datePublished":"2016-06-07T19:09:16+01:00","dateModified":"2021-04-09T18:24:28+00:00","description":"The bottom line on security is that we need to have reasonable, simple policies that result in an effective approach to security, says Karl Palachuk.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security#primaryimage","url":"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/toomuchsecurity.jpg","contentUrl":"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/toomuchsecurity.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/it\/blog\/do-we-go-overboard-security#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"MSP Business","item":"https:\/\/www.n-able.com\/it\/blog\/category\/msp-business"},{"@type":"ListItem","position":2,"name":"Do we go overboard with security?"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f2c747293642b795bef2dd9ca2c4b1c3","name":"Karl Palachuk","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/ad565b93f56558978f2cfe3c338b60e069901c986bb4278986319dda2d4d8902?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad565b93f56558978f2cfe3c338b60e069901c986bb4278986319dda2d4d8902?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad565b93f56558978f2cfe3c338b60e069901c986bb4278986319dda2d4d8902?s=96&d=mm&r=g","caption":"Karl Palachuk"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/6243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=6243"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/6243\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=6243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}