Strong Policies Keep Your Network Secure

John Storts
Slide Show

Five Security Predictions for 2011

Fundamental changes are expected in the way IT organizations think about and manage security.

Maintaining the integrity and security of your network proves no small feat, given the ever-evolving nature of cyber threats and the vulnerabilities that come with the emergence of mobile computing. Hackers keep getting smarter, more and more of the equipment we use to do work has gone mobile (and gone personal), and users just can't seem to get it into their heads that they form the front line of network security.


To keep fighting the good fight against maliciousness (or just plain laziness, as is often the case with passwords), create and enforce strong IT security policies in your organization. Thanks to our tireless, expert contributors, we can help with sample policies and policy templates to help you get started.


Here are templates, policies and other resources to help you combat security foes, whether they arrive in the form of malware-wielding malcontents or simply careless password managers:


Password Policy Template

Enterprise Password Management Guide

Sample Network Security Policy

Network Security Policy for Portable Computers

<strong>'Securing the</strong> <strong>Borderless Network' Excerpt</strong>


I also highly recommend checking out our network site, Network Security Edge, for expert insights and detailed information on perimeter security, cyber threats and data and application security.

Add Comment      Leave a comment on this blog post

Post a comment





(Maximum characters: 1200). You have 1200 characters left.




Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.