Communications can be the bane of any security administrator. They are required for business purposes in most cases, but can be the weak point in the security schema if not employed properly. To secure your network, you should
Use SSH in lieu of unencrypted protocols
Set up password-free logins as required
Replace r services and FTP with SSH equivalents
Implement SSH port forwarding
Secure X connections with SSH
User virtual private networks