by Nancy Peaslee
A fundamental Cybersecurity premise is to be aware of all assets on the network. An accurate and robust hardware list will allow for better protection of the information technology environment. When we discuss network assets, we are referring to workstations (laptops and desktops), servers (physical and virtual), printers, as well as switches and routers. We may also consider VOIP and mobile phones. By understanding and tracking attributes such as device type, location, rack, rack location, user, hostname, IP address, MAC address, serial number, vendor make and model, acquisition date, warranty information, level of data sensitivity, operating system type and version, and/or firmware version we can identify and locate our assets, which also allows us the ability to utilize the equipment more fully.