One of the questions I'm frequently asked is, "If perimeter-based data security strategies are breaking down, why aren't more companies using encryption to protect their confidential information?"
Thursday, January 31, 2008
Tuesday, January 29, 2008
Friday, January 25, 2008
- Set the theme.
- Demonstrate enthusiasm.
- Provide an outline.
- Make numbers meaningful.
- Try for an unforgettable moment.
- Create visual slides.
- Give 'em a show.
- Don't sweat the small stuff.
- Sell the benefit.
- Rehearse, rehearse, rehearse.
Wednesday, January 23, 2008
I'm an IT administrator at a community college and am gearing up for the New Year. Many students have their social security numbers on file and also use their credit cards to pay for classes online. What approaches should I make to ensure others can't take this data and use it as their own?
My answer won't be the cure-all solution, but I am providing you with some tips that will assist you in working towards your goal.
Some of the basics you want to cover include, but are not limited to, the following:
* Using Intrusion detection/monitoring for critical applications
* Encrypting the sensitive data
* Using secure firewall(s) and current configurations
* Knowing where the sensitive data resides
* Using a DMZ to protect the internal network from the external network
* Using strong authentication on equipment
* Using virus checking with current updates
* Limiting access to the data (access management)
Despite the vital role that networked printing and imaging resources play in the processes and workflows of many organisations, the imaging and printing infrastructure is often an overlooked security vulnerability. In today's office, multifunction peripherals (MFPs) can print, copy, scan to network destinations, send email attachments and handle incoming and outgoing fax transmissions. As such, MFPs have evolved to become an efficient and cost effective method of document distribution and storage and an integral part of the IT infrastructure. However, it is this network connectivity, along with hard disk and memory storage, that means that MFPs are susceptible to the same security risks as PCs and servers.
Thursday, January 10, 2008
Wednesday, January 9, 2008
The audience got into it with zest and asked a number of great questions. They even proposed answers to their question; all I had to do was listen and smile.
These recommendations, courtesy of Verizon's Stan Kang, can help your business move through the critical selection process...
Thursday, January 3, 2008
A Microsoft executive calls the ease with which two British e-crime specialists managed to hack into a Windows XP computer as both "enlightening and frightening."