8 Common Problems Our Network Assessments Reveal

October 22nd, 2012

Maybe you've noticed my zeal for business owners to recognize the need to conduct regular network assessments...

With all my years on the business side of the computer industry, I’ve seen more than my fair share of unhappy folks whose lives were turned upside-down by a network failure or compromise that never should have happened.

8 Common Problems We See:
Being skeptical is understandable. I would be too, if I didn’t run into at least single (sometimes, double!) eyebrow-raising situations more often than not when I run a network assessment for a client. Here are eight common problems I typically find:

1.     Inactive users.  Our scans reveal everyone who is configured on your system as a user. When we show that list to the owner, more often than not we find people who have been inactive for a long time because they’re no longer employed (but still have potential network access), or even sometimes users who are active, who shouldn’t be!

2.     Computers that have not logged in. Our scans will detect and highlight computers and devices that are technically still part of the network domain, but have not logged into the system. This usually happens with computers that are decommissioned for newer replacement models. The old machines are often given away to employees or charitable organizations, but are still technically part of the domain and able to gain access.

3.     Misalignment of IT asset organization. Our scans reveal how Active Directory is organized and lists all of the different security groups, computers and users. When we compare the network configurations against the company’s security policies there’s often some discrepancy that needs attention.

4.     Single Point of Failure. You probably don’t need a scan to know this, but there’s value in a report that highlights when an entire network is running off a single domain controller. If that baby goes, it’s goodnight Irene! Use the report to rethink the network vulnerability.

5.     Inappropriate User Access. How obvious is this next point; but strangely enough, its worthy of mention...I can’t tell you how many times our scans reveal that everyone is set up as a system administrator. Fortunately, most end-users don’t know it and wouldn’t have a clue what to do even if they were aware. But I’ve seen savvy computer users figure this out and take full (and inappropriate) advantage of this unintended access.

6.     Weak Passwords. When we do a scan, I get an automated assessment of the passwords that end-users have created to access the network. While our scan does not capture the actual passwords themselves, it can and does detect which passwords are weak -- meaning that they don’t comply with the company’s minimum password specifications.

7.     External Vulnerabilities. One of the more important security holes that our scans can detect are ports that are open to the internet. Sometimes the client knows about the open port and is willing to take the risk of keeping it open. But often this comes as a complete surprise and the client asks us to lock it down.

8.     Lagging Patch Management. Our scans can detect the last time the key software and operating system was patched. We often find that the clients are not diligently uploading and installing the latest version of their OS, virus protection, browsers and other key applications. This, of course, exposes them to external security breaches.

There's No Excuse To Neglect Your Network
Believe it or not all of these things and more can be uncovered in about 10-20 minutes (for typical networks) using a non-invasive network assessment tool. There’s really no excuse not to have this procedure run on a regular basis. Each time you run it, you’re likely to find something that you’ll want to fix as a preventative measure. And, in the off chance that you come up with a completely clean report, you’ll rest better at night knowing your network is safe and secure.