BreachExchange mailing list archives
Building a Comprehensive Security Solution
From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Thu, 21 Aug 2014 17:18:45 -0600
http://www.inc.com/extreme-productivity/building-a-comprehensive-security-solution.html These restrictions mean that if an enterprise doesn’t do everything possible to safeguard the information on its servers, it could face severe fines and penalties in addition to the public embarrassment of a major security breach. This means that no one method will be enough for today’s technology-driven businesses. Many small businesses today are in transition, operating in an environment that is part on-premise and part cloud computing. This hybrid environment leads to even further complications for businesses, who must now try to implement security solutions to meet each of these needs. For that reason, most enterprises are in need of a comprehensive, multi-layered approach that ensures that, if one security measure fails, another will step in to protect files and databases. Here are the basic security solutions every organization should have to make sure they have the best protection in place. Endpoint security With endpoint security, a network is set up so that each device connecting to it must adhere to a strict set of rules. You set up the rules to make certain that each of your organization’s devices follow those rules, whether they are smartphones or workstations. These standards could be the presence of updated antivirus software, a set operating system, or your designated VPN client, among other criteria. Antivirus/malware protection Each device within your enterprise should be fully protected against viruses and malware. This includes mobile devices, which are increasingly becoming more vulnerable to attack. By investing in a product that applies protection to all types of devices, you’ll ensure your entire network remains safe from attack. Automated backup Gone are the days when weeks of hard work could be completely wiped out by a hard drive failure. Every business knows the importance of backing up files on a regular basis, with automated backup saving files as soon as they’re created. Small businesses must not only make sure the latest version of a file is retrievable in the event it becomes corrupt, those backups must be saved offsite, in case something happens to the data center where servers are housed. System restoration Whether your business is operating on PCs, mobile devices, or a combination of both, it’s important to be able to get a device operational as soon as possible in the event of a failure. When a computer hard drive fails, many businesses now have a server-based image in place to restore an entire system quickly. Disaster recovery If a natural disaster like a flood or tornado affected a business, what would happen? History has shown that when these events occur, some businesses never recover. To avoid being one of those businesses, every company should have a disaster-recovery plan that is not only thorough, but regularly updated to address changes. By putting multiple layers of security in place, a business can protect itself against the inevitable. Data loss, data breaches, and debilitating viruses can strike any business without warning, so it’s important that every server, PC, and mobile device in an enterprise be fully protected at all times.
_______________________________________________ Dataloss Mailing List (dataloss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss For inquiries regarding use or licensing of data, e-mail sales () riskbasedsecurity com Supporters: Risk Based Security (http://www.riskbasedsecurity.com/) YourCISO is an affordable SaaS solution that provides a comprehensive information security program that ensures focus on the right security. If you need security help or want to provide real risk reduction for your clients contact us!
Current thread:
- Building a Comprehensive Security Solution Audrey McNeil (Aug 27)