Why flat networks are dangerous
VLANs and practical segmentation
Micro-segmentation and zero trust principles
Key Takeaways
TL;DR
Flat networks allow ransomware and attackers to spread freely — segmentation is essential.
VLANs are the most practical starting point for SMB network segmentation.
Segment at minimum: corporate, servers, guest WiFi, IoT, and management networks.
Zero trust is a journey: start with segmentation, add identity controls, then micro-segment.
FAQ
Frequently asked questions
Do I need new equipment for network segmentation?
Not necessarily. Most business-grade managed switches already support VLANs. If you're using consumer-grade unmanaged switches, you'll need to upgrade to managed switches ($100-$500 each depending on size). Your firewall needs to support inter-VLAN routing and filtering, which most business firewalls (SonicWall, Fortinet, Meraki, pfSense) already do.
What is the minimum segmentation a small business should have?
At minimum, separate guest WiFi from your corporate network, isolate IoT devices (printers, cameras) from servers and workstations, and put servers on their own segment. These three separations provide the most impact for the least complexity.
How does network segmentation help with ransomware?
Ransomware spreads by scanning the local network for other vulnerable systems. In a segmented network, a compromised workstation can only see other devices in its VLAN. Firewall rules between VLANs prevent the ransomware from reaching servers, backups, or other segments — containing the blast radius.
Related Guides
Continue reading
Get your Cyber Defense Score™ in 60 seconds.
100 tools. No installation. No credit card. Real evidence.