Tue Apr 16, 2024 4:28 pm
-Train employees to think and ask questions if unsure before clicking on anything. ( on web or in emails #1 issue )
-Make sure device firmware is always up to date.
-Use reasonable passwords for devices. ( add wo factor authentication for better protection )
-Always use antivirus.
++++++++++++++++++++++++++++++++++
The above has nothing to do with Mikrotik.
The one area where MT may be weak is IPS, intrustion protection, where deep packet inspection can occur.
I gather this means the ability to scan https type traffic and typically slows down performance considerably.
The IPS is placed inline, directly in the flow of network traffic between the source and destination. This is what differentiates IPS from its predecessor, the intrusion detection system (IDS). Conversely, IDS is a passive system that scans traffic and reports back on threats.
Usually sitting right behind the firewall, the solution analyzes all traffic flows that enter the network and takes automated actions when necessary.
These actions can include:
Sending an alarm to the administrator (as would be seen in an IDS)
Dropping the malicious packets
Blocking traffic from the source address
Resetting the connection
Configuring firewalls to prevent future attacks
High end Routers, provided IPS, so expect a high cost outlay and then yearly subscription costs as this now a cloud based service ( which keeps the router updated I imagine to threats several times a day ). The one exception, no subscription fees is something called firewalla... I wonder if anyone has used this device and can comment??