Sunday, June 5, 2011

SafeCentral Quoted in Processor Magazine

Processor Magazine ran a great feature in their February 25, 2011 issue named “Boost Your Enterprise Security”. The article discussed different threats to today’s enterprise security structures and what steps enterprises can take to prevent breaches and malicious infiltration. Several experts within the security industry including our own, CTO Ray Dickenson, contributed to the article.

The article covers several areas within security including the importance of keeping processes and policies up-to-date and that these processes are continuously updated as elements such as new staff, applications and threats that have an impact on the environment changes. One of the experts interviewed in the article also points out that it is imperative to have action plans in place so that if something does happen, the damage can be minimized and problems can be handled efficiently.

Other preventative measures enterprises can take as recommended in the article include creating a full-time high-level security position that can create or manage a security program for the entire organization; carefully monitor and control the use of portable devices; perform regular penetration testing of external and internal systems, possibly using an outside team rather than the standard IT staff; and using behavior profiling or key metrics such as privileged user activity, after-hours access, network traffic, policy changes, etc. Another great suggestion is that enterprises can use some of their existing solutions and repurpose as security solutions, such as network based anomaly detection.

The top tip discussed in the article is to address mobile devices. SafeCentral’s Chief Technology Officer, Ray Dickenson, stated that mobile devices part of any enterprise’s security realm regardless of their security policies and it’s a good idea not to ignore their presence. He goes on to urge enterprises to update network policies and employee handbooks to include the use of portable devices, explaining how and when employees can connect to, store, and forward corporate data. It is most important that employees know to never leave data behind on a device that is discarded.

To read the full Processor Magazine article and more of Ray’s quote, download and read it here: http://www.processor.com/editorial/article.asp?Article=articles/p3304/20p04/20p04.asp&GUID=.

No comments:

Post a Comment