Site icon Haznos

Are You Fully Geared? Think Twice…

<p style&equals;"text-align&colon; justify">Most IT experts and security professionals try to safeguard their organisational framework as securely as possible&period; Sometimes&comma; no matter how secure the IT structure is in an organisation&comma; more often than not there is some kind of a loophole wherein data theft can occur&period; Here are some of the common mistakes that most security professionals keep getting wrong&period; Look out for these four persistent faults and take immediate action against them&period;<&sol;p>&NewLine;<h2 style&equals;"text-align&colon; justify"><strong>1&period; Assuming that all Software is Updated and Patched<&sol;strong><&sol;h2>&NewLine;<p style&equals;"text-align&colon; justify">Almost every organisation has some form of un-patched software or the other&period; Although&comma; this is an area of concern&comma; what is deeply unnerving is that the personal computers used by most IT professionals and security experts themselves are at risk&period; When enquired whether the software in the entire organisation is patched&comma; most security professionals point out to the results of the recent scan in their Windows Update program&period; Some others point out to their preferred autonomous patch-analysing program&period; Unfortunately&comma; security professionals are not aware how faulty and dangerous some of these programs might be&period; Most independent patch-analysing programs look out for popular and widely available updates but tend to miss customised or tailored software&period; Some others do not look into the BIOS versions or firmware&comma; as updated versions can help in plugging serious security traps&period; It is important to conduct a manual survey and search for software programs that the patch-analysing program might have missed&period; All installed software must be scanned&semi; glancing at the Operating System&&num;8217&semi;s installed applications list is not helpful&comma; rather all the folders and directories must be checked&comma; the date of executables and DLLs must be looked into&comma; as well a record of all the software versions must be maintained&period; Once the check has been done&comma; the CVE database should be opened and the list should be compared with what is listed in the CVE database&period; In almost every case&comma; unpatched software is usually discovered in this manner&period;<&sol;p>&NewLine;<h2 style&equals;"text-align&colon; justify"><strong>2&period; Spending sleepless Nights over unnecessary Threats<&sol;strong><&sol;h2>&NewLine;<p style&equals;"text-align&colon; justify">Most IT experts tend to worry about vague threats that might be far lower in risk than the really big dangers that they are facing head-on&period; On a theoretical note&comma; it is important to address the most likely threats and prepare a robust security defence plan&period; But sometimes&comma; basic things such as patching the software and updating critical programs can be a huge boon&comma; rather than planning an expensive and elaborate defence strategy&period; For example&comma; IT professionals in an organisation may debate with the management on the advantages of biometric identities vis-à-vis smartcards&comma; but in reality cutting down the total number of full-time administrator accounts within the IT environment can sometimes be a better security strategy than going in for expensive installs&period;<&sol;p>&NewLine;<h2 style&equals;"text-align&colon; justify"><strong>3&period; Archaic Education to users<&sol;strong><&sol;h2>&NewLine;<p style&equals;"text-align&colon; justify">The run-of-the-mill advice that is imparted in every organisation is thus&colon; employees should not visit untrusted websites while e-mail attachments from unknown people should not be opened&period;<&sol;p>&NewLine;<p style&equals;"text-align&colon; justify">Advice 2&period;0 states thus&colon; Do not install software from the web unless there is a guarantee that it is coming from a legitimate vendor as websites visited each day are likely to be compromised&period; In addition&comma; users must be advised never to click on any unknown link or install&sol;run active content and by strangers&comma; even by people known to them&period; For example&comma; if an e-mail contains a line&comma; &&num;8220&semi;this e-mail has been analysed and is 100&percnt; virus free&comma;&&num;8221&semi; is a sure-shot sign that the attachment is malicious&period; End-users need to be taught the next round of safeguarding their own terminals&semi; they must be imparted guidelines on social engineering and phishing and the steps that they can undertake to confirm any dubious e-mail or web offer&period;<&sol;p>&NewLine;<h2 style&equals;"text-align&colon; justify"><strong>4&period; Failing to inform the Management about the right Concerns&period;<&sol;strong><&sol;h2>&NewLine;<p style&equals;"text-align&colon; justify">It has been seen that senior management are usually not aware nor told about the biggest and most impactful threats facing the organisation&period; In spite of spending thousands of dollars every year to defend an organisation&&num;8217&semi;s environment&comma; most CIOs and CTOs are unable to spell out exactly what are the biggest threats to their organisation&period; If security professionals themselves do not collect the right metrics&comma; it is not possible to gauge the danger facing the organisation&period; Almost every IT security professional reports on the number of malicious programs exposed and eliminated or the number of un-authorised messages barricaded by the firewall&comma; but do not report on the number of malware programs that go undiscovered and for how long&period; It is important to start assessing the largest and most likely threats to every organisation&semi; how such threats are entering the environment&comma; and transmit this crucial data up the management line&period;<&sol;p>&NewLine;<p style&equals;"text-align&colon; justify">Simple yet highly effective and powerful software can save millions of dollars while at the same time ensure complete peace of mind from hackers and data thieves&period; LockLizard’s PDF DRM Software protects word files and PDFs from unauthorised users and gives complete control to the administrator on the usage of classified data&period;<&sol;p>&NewLine;<p style&equals;"text-align&colon; justify">I am an IT professional&period; I am working in the field of online data security&comma; data theft and data management&period; I am sharing my experience here&comma; helping people understand the importance of securing documents and intellectual properties&period;<&sol;p>&NewLine;

Exit mobile version