Of course, but keep in mind - it was possibly a state actor, advanced hacker, or private contractor that penetrated by security before. So we're probably not dealing with Aunt Sue clicking on an advert.. Nevertheless, I've made sufficient changes that should offer the protection from those and every other source of compromise. My current network and systems have layered protection that surpasses the defense contractors and secured facilities the company I work for handles. I got lazy before, and figured a basic plug and play corporate configuration on the WAN and Endpoints was sufficient. I've taken it to a whole new level.
Here's what I have in place;
1) Fortigate E Series w/Full UTM/NGFW Layer 7 including Deep SSL inspection, DNS validation, WAF, Proxy Scanning, Web Filtration, Antivirus (extreme database), Intrusion protection system (extreme database), Application Control, Anomaly Detection, etc. (DNS pointed to secured DNS w/53 inspection) Also I am running a VPN server on this (FortiVPN)
2) FortiAP's wireless controlled (WLC) by Fortigate. Extra AP in dedicated monitoring/bulldog mode with Wireless Intrusion Detection(WIDS), RogueAP detection, Suppression. (this baby detects any attempt to hijack any devices, add a rogue AP, Pineapple, etc and executes a local DDOS suppressing the object)
3) FortiSandbox (VM), full APT, ATP, Zero Day Detection, sandbox evaluation of unknown objects.
4) Untangle Layer 7 UTM/NGFW in Transparent Mode (BROUTER). Web Filtration, Dual AV (Bit+Clam), AppControl, SNORT IPS w/LAN rules.
5) FortiSwitch - L3 switches w/vLANs. Isolated subnets with tagging. LAN is parsed into 4 distinct, isolated subnets with policy based access.
6) SIEM Network Security Evaluation System.
MANY other things are in place that follow best practice for security. Such as eliminated/reduced WAN access to admin of any device, unique ports for admin (SSL), timed access w/MAC restriction. WAN/LAN access is automatically disabled for all Windows devices from 1AM-8AM. Laptops have a program on them that disables the Wireless Adapters if the laptop isn't in use or shuts down/sleeps. (see broadcom vulnerability). Some other big surprises I can't disclose here.
Endpoints have Heimdal Pro, Kaspersky Free, Voodooshield(paid) and RollbackRX. Mobile devices are using V3 Antivirus and FortiVPN's pointing back to my local network for high security on the move.