The Security Guide Security Guide RSS Feed
*
Accessibility

Background


Manage your Risks Online

Welcome to the Internet and Data Security Guide

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

If you were to ask the average business user to list three things that come to mind connected with IT, chances are one of the three would in some way be connected with security.

There have been lots of high profile data losses - CDs lost in the post, memory sticks left on trains, laptops stolen from cars; these lead on to the ever present worry about security related to online working and identity theft.

Whenever you need to make a decision about how to enhance your system, you need to have security uppermost among your requirements.

When you are thinking about system security, there is no one aspect that will secure your systems - you need an overall security strategy.

 

Contact Us
Name

Comments/Enquiries

Your E-Mail

 

Security concerns are in some ways peripheral to normal business working, but serve to highlight just how important it is that your business users feel confident when using your IT systems. Security will probably always be high on the IT agenda simply because cyber criminals know that a successful attack is very profitable. This means they will always strive to find new ways to circumvent your IT security, and you will consequently need to be continually vigilant.

It is no point having a network with a secure perimeter if the laptops of your business users are not security protected; the most secure email system in the world will not help if your business users send emails with confidential information because they are not security aware. Security has to be holistic, and you have to think about defending all aspects of your infrastructure - the servers and desktops, the network itself, wireless networks, computers that access your system remotely - all need to be equally secure.

You cannot eliminate security risks, but you can manage and mitigate the risk. The key to a successful security strategy is usually described as "Defence in Depth". The idea behind this is simple - you don't rely on a single protection for security, so that if one part of your security system is breached, the attackers only get as far as the next layer of security.

Bookmark with: DeliciousDelicious DiggDigg RedditReddit FacebookFacebook StumbleuponStumbleUpon

© RuleWorks - All Rights Reserved - Policy - - Sitemap