BreachExchange mailing list archives

Building a Comprehensive Security Solution


From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Thu, 21 Aug 2014 17:18:45 -0600

http://www.inc.com/extreme-productivity/building-a-comprehensive-security-solution.html

These restrictions mean that if an enterprise doesn’t do everything
possible to safeguard the information on its servers, it could face severe
fines and penalties in addition to the public embarrassment of a major
security breach.

This means that no one method will be enough for today’s technology-driven
businesses. Many small businesses today are in transition, operating in an
environment that is part on-premise and part cloud computing. This hybrid
environment leads to even further complications for businesses, who must
now try to implement security solutions to meet each of these needs. For
that reason, most enterprises are in need of a comprehensive, multi-layered
approach that ensures that, if one security measure fails, another will
step in to protect files and databases. Here are the basic security
solutions every organization should have to make sure they have the best
protection in place.

Endpoint security

With endpoint security, a network is set up so that each device connecting
to it must adhere to a strict set of rules. You set up the rules to make
certain that each of your organization’s devices follow those rules,
whether they are smartphones or workstations. These standards could be the
presence of updated antivirus software, a set operating system, or your
designated VPN client, among other criteria.

Antivirus/malware protection

Each device within your enterprise should be fully protected against
viruses and malware. This includes mobile devices, which are increasingly
becoming more vulnerable to attack. By investing in a product that applies
protection to all types of devices, you’ll ensure your entire network
remains safe from attack.

Automated backup

Gone are the days when weeks of hard work could be completely wiped out by
a hard drive failure. Every business knows the importance of backing up
files on a regular basis, with automated backup saving files as soon as
they’re created. Small businesses must not only make sure the latest
version of a file is retrievable in the event it becomes corrupt, those
backups must be saved offsite, in case something happens to the data center
where servers are housed.

System restoration

Whether your business is operating on PCs, mobile devices, or a combination
of both, it’s important to be able to get a device operational as soon as
possible in the event of a failure. When a computer hard drive fails, many
businesses now have a server-based image in place to restore an entire
system quickly.

Disaster recovery

If a natural disaster like a flood or tornado affected a business, what
would happen? History has shown that when these events occur, some
businesses never recover. To avoid being one of those businesses, every
company should have a disaster-recovery plan that is not only thorough, but
regularly updated to address changes.

By putting multiple layers of security in place, a business can protect
itself against the inevitable. Data loss, data breaches, and debilitating
viruses can strike any business without warning, so it’s important that
every server, PC, and mobile device in an enterprise be fully protected at
all times.
_______________________________________________
Dataloss Mailing List (dataloss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss
For inquiries regarding use or licensing of data, e-mail
        sales () riskbasedsecurity com 

Supporters:

Risk Based Security (http://www.riskbasedsecurity.com/)
YourCISO is an affordable SaaS solution that provides a comprehensive information security program that ensures focus 
on the right security.  If you need security help or want to provide real risk reduction for your clients contact us!

Current thread: