Our clients often ask us what IT specialists mean by “network segmentation.” Well, if you’ve ever watched a submarine movie, there’s usually a scene where ships on the surface are dropping depth charges on the sub. Inevitably there’s a hull breach somewhere that threatens the whole ship. The sailors struggle to plug the leak, but having failed, they retreat through a portal and seal the hatch behind them. That stops the water at that point of entry and spares the ship. So it is with network segmentation.
Like the submarine, your network is under attack from outside forces, seeking to create a breach through which to enter and cause harm. Your network has a hull that seals it off from the outside world, consisting of firewalls, passwords, multifactor authentications, antivirus software, and employee training. But if they’re hit hard enough, hulls can be breached. When that happens, network segmentation limits the incursion. The hacker or the malware hits a locked hatch, and cannot run wild within your entire system.
Network segmentation is a viable and effective defense strategy for any organization consisting of separate departments. If your workers’ tasks are confined to a portion of your system, there’s no reason for them to have easy, immediate access to the whole system. And if they don’t have easy, immediate access, neither do the intruders who capture their devices.
These days, larger companies often talk in terms of silos. Workers from specific teams are practically quarantined among themselves, rarely interacting with workers from other departments who labor in their own silos. Good for intensive immersion in niche areas, not so good for cross-articulation and synergy. But the “silo farm” is an excellent model for network segmentation, because it tells you where to place your hatches, your shut-off valves, your firewalls, your barbed wire, your castle moats, or any other name you assign to your barriers to entry.
However, a small business is not as bureaucratic, and workers in single departments often perform overlapping tasks. Thus, small businesses do not lend themselves as easily to network segmentation. But it can be done, and given the cost of a security breach that could impact your entire network, some level of segmentation must be done.
Here then, are the basic steps for small businesses to design and implement a network segmentation:
Every small business is different, but all face a common enemy: the cybercriminal. The IT security pros at KMF Technologies can help give your company the protection it needs.