Abstract:
In recent years, internet architecture security has become a crucial goal of developers. Traditionally, companies have focused on protecting user-side systems, however, while protecting data should be the first priority, as most cyber attackers attempt to breach data centers. In order to protect data, companies should follow the principles of segmentation, the separation of security zones in company infrastructure, lateral movement, the monitoring of horizontal data flows, legacy management, the restrictive usage of legacy applications, and server provisioning, the careful lockdown of all unnecessary potential access points. It is also important to account for the human element in cybersecurity, following the principles of standardizing the desktop image organization-wide, utilizing cloud computing services where possible, enforcing tighter authentication standards, and monitoring privileges. Before investing great amounts of money in security, companies should focus on implementing these points in their operations.