Featured Pathways

More pathways

Banking Essentials - Part I

This pathway will walk us through the basics of banks, starting with some of the different types and their main functions, then starting to look at the regulation faced by the banks, both before and after the Global Financial Crisis.

Greenwashing

Greenwashing is the act of distributing false information about something being more environmentally friendly than it actually is.

More pathways

Book a demo

Pricing

Ready to get started?

Plans & Membership

Our Platform

Expert led content

+1,000 expert presented, on-demand video modules

Learning analytics

Keep track of learning progress with our comprehensive data

Interactive learning

Engage with our video hotspots and knowledge check-ins

Testing & certification

Gain CPD / CPE credits and professional certification

Managed learning

Build, scale and manage your organisation’s learning

Integrations

Connect Finance Unlocked to your current platform

Featured Content

More featured content

Tackling the Cost of Living Crisis

In this video, Max discusses the cost-of-living crisis currently enveloping the UK. He examines its impact on households as well as the overall economy.

CSR and Sustainability in Financial Services

In the first video of this two-part video series, Elisa introduces us to sustainability. She begins by looking at the difference between sustainability and corporate social responsibility, two terms that can be easily confused.

More featured content

Book a demo

Pricing

Ready to get started?

Featured Pathways

More pathways

Banking Essentials - Part I

This pathway will walk us through the basics of banks, starting with some of the different types and their main functions, then starting to look at the regulation faced by the banks, both before and after the Global Financial Crisis.

Greenwashing

Greenwashing is the act of distributing false information about something being more environmentally friendly than it actually is.

More pathways

Book a demo

Pricing

Ready to get started?

Plans & Membership

Our Platform

Expert led content

+1,000 expert presented, on-demand video modules

Learning analytics

Keep track of learning progress with our comprehensive data

Interactive learning

Engage with our video hotspots and knowledge check-ins

Testing & certification

Gain CPD / CPE credits and professional certification

Managed learning

Build, scale and manage your organisation’s learning

Integrations

Connect Finance Unlocked to your current platform

Featured Content

More featured content

Tackling the Cost of Living Crisis

In this video, Max discusses the cost-of-living crisis currently enveloping the UK. He examines its impact on households as well as the overall economy.

CSR and Sustainability in Financial Services

In the first video of this two-part video series, Elisa introduces us to sustainability. She begins by looking at the difference between sustainability and corporate social responsibility, two terms that can be easily confused.

More featured content

Book a demo

Pricing

Ready to get started?

Book a demo

Pricing

Ready to get started?

How to Protect Your Network

How to Protect Your Network

Ciaran Rooney

20 years: technology, cybersecurity & operations

Hacking isn’t always about a hooded figure furiously tapping away at a keyboard to crack a network’s defences. Sometimes it’s about using a fish tank thermometer in a particularly ingenious way. Join Ciaran Rooney as he explains how we can protect our networks.

Hacking isn’t always about a hooded figure furiously tapping away at a keyboard to crack a network’s defences. Sometimes it’s about using a fish tank thermometer in a particularly ingenious way. Join Ciaran Rooney as he explains how we can protect our networks.

Subscribe to watch

Access this and all of the content on our platform by signing up for a 7-day free trial.

How to Protect Your Network

9 mins 22 secs

Overview

Security is built in layers, with each layer providing additional protection. There are three layers making up network security. Physical controls (to prevent unauthorised personnel from gaining physical access to network components), technical controls (to protect the data stored on the network once it leaves the application layer) and administrative controls (a set of controls, security policies, and processes that observe and control user behaviour in a network). To protect your network you should implement these controls: use authentication, firewalls, virtual private networks, antivirus software, and network segmentation. Then educate your team and check your settings.

Key learning objectives:

  • Outline network security controls

  • Understand the steps to protect your network

Subscribe to watch

Access this and all of the content on our platform by signing up for a 7-day free trial.

Summary

What are the three layers of network security controls? 

Physical controls: These are in place to prevent unauthorised personnel from gaining physical access to network components such as routers, cables, switches and other network equipment. In companies, physical security is typically locks used to secure their computers, server rooms and LAN equipment. The measures used at ISPs generally are much higher, including; restricted building access controls, CCTV, locked cages in data centres, biometric authentication and sonar and radar covering undersea cables.

Technical controls: These protect the data stored on the network once it leaves the application layer and communicates with our system through to the network layer. They cover the data flowing in and out of the network and implementation is through encryption. 

Administrative controls: These are targeted at end-users. They are a set of controls, security policies, and processes that observe and control user behaviour in a network. They contain how different users are recognised in the network, how they are authenticated, what data they can and cannot access and how IT staff can implement changes to the network.

What steps can we take to protect our network?

Authentication: Authentication is a means of verifying your users and is the cornerstone of any security controls. Most businesses and ISPs will now also use two-factor authentication, for further proof of identity, for any employees with access to modify the network.

Firewalls: Firewalls serve as a barrier between untrusted external networks and your trusted network. Network administrators configure rules to analyse and then block or permit traffic onto the network at a packet level. Modern firewalls can be either physical devices or cloud-based web services.  

Virtual private networks: A VPN allows you to create a private network connection in software while on a public or unsecured network. All your traffic is routed through the VPN’s secure ‘tunnel’ to a remote server, which is encrypted at a packet level, masking your identity and keeping the data safe whilst in transit. 

Antivirus and antimalware software: Good network security should always include installing appropriate antivirus and antimalware software. A good choice is one that constantly scans files in the network and checks files upon entry. These will protect an organisation from a range of malicious software, including viruses, ransomware, worms and trojans.

Network segmentation and access control: Segmentation is the practice of splitting your network by access level and purpose. This is one of the essential security measures organisations and individuals can undertake. It helps in safeguarding both users and devices from hackers on the internet, as even if one device on the network is compromised, it prevents it from accessing all parts of your network. 

Education: Keeping people educated on what to do and what not to do is incredibly important. Attackers can send a phishing email to thousands of people, but it only requires one person to make an error that can bring down an entire network. Ensuring that people report all suspected threats, as standard, means that you will be better prepared and can reduce the possible harm caused or even prevent it altogether if a mistake is made.

Check your settings: When it comes to all of your network devices, make sure that you always check the settings and avoid using the default username, password or other insecure settings provided when you first bought the device. Ensure you understand all the features your device offers and disable any that you don’t need, or that could potentially threaten your network. 

Subscribe to watch

Access this and all of the content on our platform by signing up for a 7-day free trial.

Ciaran Rooney

Ciaran Rooney

Ciarán is the Chief Technology Officer of Finance Unlocked Ltd, the company behind the learning platforms Finance Unlocked and Sustainability Unlocked. He has over 20 years of experience in technology, cybersecurity and operations. Ciarán has held the role of CTO of several successful startups, including; busuu, one of the world's largest language learning platforms; the ad tech company Skimlinks, a content monetisation platform for some of the world's largest online publishers; and Swoon, a leading direct to consumer furniture brand. He has also been a technical consultant, a startup mentor, a conference speaker, and the Chair of the PHP UK Conference.

There are no available videos from "Ciaran Rooney"