{"id":2117,"date":"2017-03-16T07:24:41","date_gmt":"2017-03-16T12:24:41","guid":{"rendered":"http:\/\/www.stratospherenetworks.com\/blog\/?p=2117"},"modified":"2018-06-26T12:03:59","modified_gmt":"2018-06-26T17:03:59","slug":"12-steps-make-infrastructure-secure-updating-workstations-servers","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/","title":{"rendered":"12 Steps to Make Your IT Infrastructure More Secure: Updating Workstations and Servers"},"content":{"rendered":"<p><a href=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/servers.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-2118\" src=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/servers-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/servers-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/servers-768x512.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2017\/03\/servers-1024x683.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>If you\u2019ve been following our series of blog posts on making your IT infrastructure secure so far, you\u2019ve already <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-to-make-infrastructure-secure-performing-security-audit\/\" target=\"_blank\">performed a security audit<\/a>, <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-creating-enforcing-security-policies\/\" target=\"_blank\">created and enforced<\/a> IT security policies, and <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-anti-virus\/\" target=\"_blank\">updated your anti-virus solution<\/a>. You\u2019re already well on your way to achieving comprehensive protection against evolving <a href=\"http:\/\/www.stratospherenetworks.com\/data-security-solutions.html\" target=\"_blank\">cybersecurity<\/a> threats like ransomware and other forms of malware.<\/p>\n<p>But your work isn\u2019t finished yet. The next step you\u2019ll want to take to secure your infrastructure and minimize your risk of data breaches involves safeguarding your workstations and servers. These aspects of your infrastructure must have their own individual security measures, and making sure those are up to date is crucial if you want to fend off malicious entities and hackers attempting to gain access to sensitive information. Here are some tips for tackling this step in the infrastructure security process.<\/p>\n<p><strong>Ensure firewalls are on<br \/>\n<\/strong>Your company\u2019s workstations and servers have local <a href=\"http:\/\/www.stratospherenetworks.com\/it-glossary\/firewall.html\" target=\"_blank\">firewalls<\/a>, which prevent unauthorized users from gaining access to your network, infrastructure, and data. The first thing you\u2019ll want to do to make sure workstations and servers are secure is to check that all of their local firewalls are on and functioning. Otherwise, these aspects of your IT infrastructure are vulnerable to cyberattacks and leave you open to a costly data breach. \u00a0\u00a0<strong><\/p>\n<p>Update workstation and server security solutions<br \/>\n<\/strong>If you\u2019re aiming for comprehensive cybersecurity, it\u2019s not enough to simply have security solutions and software in place and switched on (although it\u2019s a good start). IT security threats like malware continue to evolve at a rapid pace and develop new tricks for bypassing a business\u2019s defenses. As a result, security tools must also get updated to effectively fight back against the ever-changing landscape of IT threats.<\/p>\n<p>For instance, you might want to consider <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/solution-spotlight-cisco-firepower-next-generation-firewalls-and-advanced-malware-protection\/\" target=\"_blank\">next-generation firewalls<\/a>. A next-gen firewall can not only stop malicious programs from gaining access to your IT network and infrastructure but also allow for faster malware detection and give you the capability to efficiently track and contain any threats that do make it past your defenses. <strong><\/p>\n<p>Automate updates<\/strong><br \/>\nThe IT security threat landscape changes quickly, so security solutions require frequent updates to remain current and maximally effective. In order to optimize your company\u2019s operations, it\u2019s a great idea to <a href=\"http:\/\/www.stratospherenetworks.com\/blog\/4-advantages-of-automation-for-your-business\/\" target=\"_blank\">automate<\/a> the update process for your servers and workstations to save time and boost efficiency while still maintaining current security measures.<\/p>\n<p>Once you\u2019ve completed this step and ensured your workstations and servers are adequately protected, you\u2019re well on your way to achieving optimal IT infrastructure security. However, there\u2019s still plenty left to do. Come back next week to learn about the next step in the process.<\/p>\n<p>Until then, if you\u2019d like more information about workstation and server security, don\u2019t hesitate to reach out to our expert team of techs by calling 877-599-3999 or emailing <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\">sales@stratospherenetworks.com<\/a>. Stratosphere Networks offers a range of <a href=\"http:\/\/www.stratospherenetworks.com\/data-security-solutions.html\" target=\"_blank\">IT security solutions<\/a> (including anti-virus), and our team members can answer any questions you have about keeping your organization safe from cyber attackers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019ve been following our series of blog posts on making your IT infrastructure secure so far, you\u2019ve already performed a security audit, created and enforced IT security policies, and updated your anti-virus solution. You\u2019re already well on your way &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-2117","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>12 Steps to Secure IT Infrastructure: Workstations and Servers<\/title>\n<meta name=\"description\" content=\"The fourth step in the process of securing IT infrastructure is updating your workstations and servers. Make sure their security solutions are up to date.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"12 Steps to Secure IT Infrastructure: Workstations and Servers\" \/>\n<meta property=\"og:description\" content=\"The fourth step in the process of securing IT infrastructure is updating your workstations and servers. Make sure their security solutions are up to date.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-16T12:24:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-06-26T17:03:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"12 Steps to Make Your IT Infrastructure More Secure: Updating Workstations and Servers\",\"datePublished\":\"2017-03-16T12:24:41+00:00\",\"dateModified\":\"2018-06-26T17:03:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/\"},\"wordCount\":526,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/\",\"name\":\"12 Steps to Secure IT Infrastructure: Workstations and Servers\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2017-03-16T12:24:41+00:00\",\"dateModified\":\"2018-06-26T17:03:59+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"description\":\"The fourth step in the process of securing IT infrastructure is updating your workstations and servers. Make sure their security solutions are up to date.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"12 Steps to Make Your IT Infrastructure More Secure: Updating Workstations and Servers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"12 Steps to Secure IT Infrastructure: Workstations and Servers","description":"The fourth step in the process of securing IT infrastructure is updating your workstations and servers. Make sure their security solutions are up to date.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/","og_locale":"en_US","og_type":"article","og_title":"12 Steps to Secure IT Infrastructure: Workstations and Servers","og_description":"The fourth step in the process of securing IT infrastructure is updating your workstations and servers. Make sure their security solutions are up to date.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2017-03-16T12:24:41+00:00","article_modified_time":"2018-06-26T17:03:59+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"12 Steps to Make Your IT Infrastructure More Secure: Updating Workstations and Servers","datePublished":"2017-03-16T12:24:41+00:00","dateModified":"2018-06-26T17:03:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/"},"wordCount":526,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/","name":"12 Steps to Secure IT Infrastructure: Workstations and Servers","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2017-03-16T12:24:41+00:00","dateModified":"2018-06-26T17:03:59+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"description":"The fourth step in the process of securing IT infrastructure is updating your workstations and servers. Make sure their security solutions are up to date.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-workstations-servers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"12 Steps to Make Your IT Infrastructure More Secure: Updating Workstations and Servers"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2117"}],"version-history":[{"count":1,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2117\/revisions"}],"predecessor-version":[{"id":2119,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2117\/revisions\/2119"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}