{"id":550,"date":"2020-05-20T10:29:46","date_gmt":"2020-05-20T15:29:46","guid":{"rendered":"https:\/\/www.is-t.net\/blog\/?p=550"},"modified":"2022-07-06T11:03:38","modified_gmt":"2022-07-06T16:03:38","slug":"good-network-security-plan","status":"publish","type":"post","link":"https:\/\/www.is-t.net\/blog\/good-network-security-plan\/","title":{"rendered":"Characteristics Of  A Good Network Security Plan"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"550\" class=\"elementor elementor-550\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bd0df6b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bd0df6b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-653d388\" data-id=\"653d388\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-13f3cf9 elementor-widget elementor-widget-text-editor\" data-id=\"13f3cf9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>For modern businesses, there is perhaps no issue more crippling to productivity and business operations than a network security issue. When network systems are down, important business activities grind to halt, creating a variety of issues from customer service complaints to lost earnings.<\/p><p>The best way for businesses to help prevent these events from happening is to design and implement a solid network security plan. By creating a plan that enforces best practices, monitors the network, and provides solutions for network issues, businesses set themselves up for success.<\/p><p><strong>The following are key elements of a good quality security plan.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ae455f elementor-widget elementor-widget-image\" data-id=\"8ae455f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"400\" src=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/05\/GoodSecurityPlan1_IST.jpg\" class=\"attachment-full size-full wp-image-553\" alt=\"Network Security Company Houston\" srcset=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/05\/GoodSecurityPlan1_IST.jpg 800w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/05\/GoodSecurityPlan1_IST-300x150.jpg 300w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/05\/GoodSecurityPlan1_IST-768x384.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65a1d9f elementor-widget elementor-widget-heading\" data-id=\"65a1d9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.is-t.net\/blog\/good-network-security-plan\/#Identifying_Your_Security_Threats\" >Identifying Your Security Threats<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.is-t.net\/blog\/good-network-security-plan\/#Make_Network_Security_a_Priority_in_Business_Culture\" >Make Network Security a Priority in Business Culture<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.is-t.net\/blog\/good-network-security-plan\/#Regulatory_Compliance\" >Regulatory Compliance<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.is-t.net\/blog\/good-network-security-plan\/#Multi-Layer_Network_Security\" >Multi-Layer Network Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.is-t.net\/blog\/good-network-security-plan\/#247_Monitoring_Response\" >24\/7 Monitoring &amp; Response<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.is-t.net\/blog\/good-network-security-plan\/#Automated_Backups\" >Automated Backups<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"Identifying_Your_Security_Threats\"><\/span>Identifying Your Security Threats<span class=\"ez-toc-section-end\"><\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a46bb89 elementor-widget elementor-widget-text-editor\" data-id=\"a46bb89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Before your business can begin defending against cyber security threats, you must not only understand the basics of network security threats but also understand your business\u2019s specific vulnerabilities. A reputable<a href=\"https:\/\/www.is-t.net\/managed-it-services-houston-tx\/network-security\"> network security provider<\/a> can do a network risk assessment that will identify threats that are unique to your business, evaluate your network\u2019s weaknesses, and create a plan for how to strengthen network security and defend against threats. It\u2019s always best to have a third-party do this assessment, as in-house IT staff can be biased toward their own network security methods.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f82f822 elementor-widget elementor-widget-heading\" data-id=\"f82f822\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"Make_Network_Security_a_Priority_in_Business_Culture\"><\/span>Make Network Security a Priority in Business Culture<span class=\"ez-toc-section-end\"><\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12a000f elementor-widget elementor-widget-text-editor\" data-id=\"12a000f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As businesses become more reliant on technology and network tools to run successfully, network issues become a greater hindrance to overall productivity, ultimately affecting everyone from entry level employees to CEOs. As network security affects everyone in the company, it should also be a priority for everyone. By instituting policies and training programs that enforce a culture that prioritizes network security best practices, businesses can help mitigate irresponsible mistakes that can put networks at risk.<\/p><p>Examples of good network security practices that can be implemented as part of business culture include:<\/p><ul><li>Requiring the use strong passwords that use varying characters, both uppercase and lowercase, and are difficult to guess<\/li><li>Requiring employees to change passwords regularly<\/li><li>Training employees on best practices while online, such as not clicking on strange links from unknown sources<\/li><li>Tracking employee logins to business systems<\/li><li>Requiring employees to regularly update their workstations and software when prompted<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6b4908 elementor-widget elementor-widget-heading\" data-id=\"d6b4908\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"Regulatory_Compliance\"><\/span>Regulatory Compliance<span class=\"ez-toc-section-end\"><\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-984f9ce elementor-widget elementor-widget-text-editor\" data-id=\"984f9ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Every industry has their own regulatory standards regarding network security. For financial businesses, there are regulations in place to ensure the protection of client and staff financial and personal information. For medical businesses, HIPAA regulations protect patient\u2019s medical records and personal information. With more businesses utilizing online tools to conduct day-to-day businesses, industries of all types are creating regulations which businesses must adhere to. Know your industry\u2019s regulations and implement a networking security plan accordingly.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45261c1 elementor-widget elementor-widget-image\" data-id=\"45261c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"400\" src=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/05\/GoodSecurityPlan2_IST.jpg\" class=\"attachment-full size-full wp-image-554\" alt=\"Good Network Security Plan\" srcset=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/05\/GoodSecurityPlan2_IST.jpg 800w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/05\/GoodSecurityPlan2_IST-300x150.jpg 300w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/05\/GoodSecurityPlan2_IST-768x384.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-099563a elementor-widget elementor-widget-heading\" data-id=\"099563a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"Multi-Layer_Network_Security\"><\/span>Multi-Layer Network Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a20762 elementor-widget elementor-widget-text-editor\" data-id=\"5a20762\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Simple antivirus is not enough to defend against modern network security threats. To provide a comprehensive solution, businesses must implement a network security plan that has multiple layers of protection. This means that in addition to having network monitoring, antivirus software, and the like, businesses must consider all potential points of entry and prioritize protecting them. This includes email, workstations, and all network connected devices, including tablets, phones, and security cameras. Dual authentication, which requires users to verify their identity with multiple devices, can assist in providing another layer of protection.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12dbcec elementor-widget elementor-widget-heading\" data-id=\"12dbcec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"247_Monitoring_Response\"><\/span>24\/7 Monitoring &amp; Response<span class=\"ez-toc-section-end\"><\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16b103f elementor-widget elementor-widget-text-editor\" data-id=\"16b103f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Business networks are too valuable to only be protected during business hours. A truly effective network security solution should monitor and protect the network 24 hours a day, 7 days a week, 365 days a year. In addition, there should be an outlined process for network support and repair that is available all year round. Hackers and cyber criminals don\u2019t take days off, which means your network security plan shouldn\u2019t either.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85c14d0 elementor-widget elementor-widget-heading\" data-id=\"85c14d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"Automated_Backups\"><\/span>Automated Backups<span class=\"ez-toc-section-end\"><\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a274526 elementor-widget elementor-widget-text-editor\" data-id=\"a274526\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In the event of a cyber security breach, businesses need to know that their data is protected and can be restored quickly. This can only be achieved with regular backups. Whether through an on-staff IT team or via a third-party managed services provider, business owners must ensure that there is an automatic backup plan in place which regularly backs up data and securely stores it so it can be restored at any time.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>For modern businesses, there is perhaps no issue more crippling to productivity and business operations than a network security issue. When network systems are down, important business activities grind to halt, creating a variety of issues from customer service complaints to lost earnings. The best way for businesses to help prevent these events from happening [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":554,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[3],"tags":[],"class_list":["post-550","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-managed-services"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A Solid Network Security Plan Can Save You From Unwanted Downtime<\/title>\n<meta name=\"description\" content=\"FInd out what a solid network security plan looks like and why it might just be best to outsource your network security to a reliable provider.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.is-t.net\/blog\/good-network-security-plan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Solid Network Security Plan Can Save You From Unwanted Downtime\" \/>\n<meta property=\"og:description\" content=\"FInd out what a solid network security plan looks like and why it might just be best to outsource your network security to a reliable provider.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.is-t.net\/blog\/good-network-security-plan\/\" \/>\n<meta property=\"og:site_name\" content=\"IS&amp;T Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-20T15:29:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-06T16:03:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/05\/GoodSecurityPlan2_IST.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Scott Lard\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Lard\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/good-network-security-plan\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/good-network-security-plan\\\/\"},\"author\":{\"name\":\"Scott Lard\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/person\\\/01b75441ccfa116bc0ca0750c112b0fa\"},\"headline\":\"Characteristics Of A Good Network Security Plan\",\"datePublished\":\"2020-05-20T15:29:46+00:00\",\"dateModified\":\"2022-07-06T16:03:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/good-network-security-plan\\\/\"},\"wordCount\":680,\"publisher\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/good-network-security-plan\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/GoodSecurityPlan2_IST.jpg\",\"articleSection\":[\"Managed Services\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/good-network-security-plan\\\/\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/good-network-security-plan\\\/\",\"name\":\"A Solid Network Security Plan Can Save You From Unwanted Downtime\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/good-network-security-plan\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/good-network-security-plan\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/GoodSecurityPlan2_IST.jpg\",\"datePublished\":\"2020-05-20T15:29:46+00:00\",\"dateModified\":\"2022-07-06T16:03:38+00:00\",\"description\":\"FInd out what a solid network security plan looks like and why it might just be best to outsource your network security to a reliable provider.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/good-network-security-plan\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.is-t.net\\\/blog\\\/good-network-security-plan\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/good-network-security-plan\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Characteristics Of A Good Network Security Plan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/\",\"name\":\"IS&amp;T Blog\",\"description\":\"News for nerds, stuff that matters\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#organization\",\"name\":\"IS&T Consulting Group, LLC\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ist-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ist-logo.png\",\"width\":125,\"height\":47,\"caption\":\"IS&T Consulting Group, LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/person\\\/01b75441ccfa116bc0ca0750c112b0fa\",\"name\":\"Scott Lard\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g\",\"caption\":\"Scott Lard\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Solid Network Security Plan Can Save You From Unwanted Downtime","description":"FInd out what a solid network security plan looks like and why it might just be best to outsource your network security to a reliable provider.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.is-t.net\/blog\/good-network-security-plan\/","og_locale":"en_US","og_type":"article","og_title":"A Solid Network Security Plan Can Save You From Unwanted Downtime","og_description":"FInd out what a solid network security plan looks like and why it might just be best to outsource your network security to a reliable provider.","og_url":"https:\/\/www.is-t.net\/blog\/good-network-security-plan\/","og_site_name":"IS&amp;T Blog","article_published_time":"2020-05-20T15:29:46+00:00","article_modified_time":"2022-07-06T16:03:38+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/05\/GoodSecurityPlan2_IST.jpg","type":"image\/jpeg"}],"author":"Scott Lard","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Scott Lard","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.is-t.net\/blog\/good-network-security-plan\/#article","isPartOf":{"@id":"https:\/\/www.is-t.net\/blog\/good-network-security-plan\/"},"author":{"name":"Scott Lard","@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/person\/01b75441ccfa116bc0ca0750c112b0fa"},"headline":"Characteristics Of A Good Network Security Plan","datePublished":"2020-05-20T15:29:46+00:00","dateModified":"2022-07-06T16:03:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.is-t.net\/blog\/good-network-security-plan\/"},"wordCount":680,"publisher":{"@id":"https:\/\/www.is-t.net\/blog\/#organization"},"image":{"@id":"https:\/\/www.is-t.net\/blog\/good-network-security-plan\/#primaryimage"},"thumbnailUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/05\/GoodSecurityPlan2_IST.jpg","articleSection":["Managed Services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.is-t.net\/blog\/good-network-security-plan\/","url":"https:\/\/www.is-t.net\/blog\/good-network-security-plan\/","name":"A Solid Network Security Plan Can Save You From Unwanted Downtime","isPartOf":{"@id":"https:\/\/www.is-t.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.is-t.net\/blog\/good-network-security-plan\/#primaryimage"},"image":{"@id":"https:\/\/www.is-t.net\/blog\/good-network-security-plan\/#primaryimage"},"thumbnailUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/05\/GoodSecurityPlan2_IST.jpg","datePublished":"2020-05-20T15:29:46+00:00","dateModified":"2022-07-06T16:03:38+00:00","description":"FInd out what a solid network security plan looks like and why it might just be best to outsource your network security to a reliable provider.","breadcrumb":{"@id":"https:\/\/www.is-t.net\/blog\/good-network-security-plan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.is-t.net\/blog\/good-network-security-plan\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.is-t.net\/blog\/good-network-security-plan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.is-t.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Characteristics Of A Good Network Security Plan"}]},{"@type":"WebSite","@id":"https:\/\/www.is-t.net\/blog\/#website","url":"https:\/\/www.is-t.net\/blog\/","name":"IS&amp;T Blog","description":"News for nerds, stuff that matters","publisher":{"@id":"https:\/\/www.is-t.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.is-t.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.is-t.net\/blog\/#organization","name":"IS&T Consulting Group, LLC","url":"https:\/\/www.is-t.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2019\/04\/ist-logo.png","contentUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2019\/04\/ist-logo.png","width":125,"height":47,"caption":"IS&T Consulting Group, LLC"},"image":{"@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/person\/01b75441ccfa116bc0ca0750c112b0fa","name":"Scott Lard","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g","caption":"Scott Lard"}}]}},"_links":{"self":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts\/550","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/comments?post=550"}],"version-history":[{"count":8,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts\/550\/revisions"}],"predecessor-version":[{"id":3415,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts\/550\/revisions\/3415"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/media\/554"}],"wp:attachment":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/media?parent=550"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/categories?post=550"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/tags?post=550"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}