Networking & Communication
FROM BREACH TO BACKBONE
Mark Carty, Channel Account Manager at D-Link looks at why 2026 starts with network security.
A
s we approach the end of 2025, IT leaders will be reviewing their yearly spend and looking at what to prioritise in the coming
year to foster productivity and growth. Likely to be at the top of the agenda for 2026 is security, with this year bearing witness to a flurry of cyber- attacks that have paralysed the supply chains and downed the payment systems of some of the largest global organisations spanning from retail to automotive. Te impact of a breach tends to be devastating,
with not only a potential for millions lost through stolen funds but also from the operational disruption that ensues from vital IT systems being down. Yet arguably a far greater cost in the long term is the erosion of customer trust and brand reputation, which can take years to rebuild. If 2025 has shown us anything, it’s that if the goliaths of retail can have their security defences breached, then anyone can. So, what can SMEs and channel businesses do to protect themselves as a first line of defence? Te answer begins with securing the network.
32 | November/December 2025
With so many high-profile cyber-attacks this year, what lessons can businesses learn? First, IT departments should ensure that they are only working with a network of vetted and trusted partners and suppliers. Hackers can gain easy access through external vulnerabilities – such as third-party software platforms or cloud management services - so auditing and keeping those platforms up-to-date is crucial. Second, businesses should also consider keeping their networking platforms on-premise in order to retain control and to standardise their hardware and software deployments to keep out security backdoors. While it’s easy to assume that the threat
of a breach might come from outside your corporate network, it’s also important not to overlook your internal network. That’s why network hygiene is essential, and a robust internal network policy is non-negotiable. This could include things like implementing BYOD, Guest Networks and VPN policies.
www.pcr-online.biz
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52