Five Things to Do Now for Greater Security and Compliance

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7
Previous Next

Click through for five things to look for to improve security and compliance, as identified by Dan Ross, Promisec CEO.

Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

2013 was a year full of well publicized data-breaches. In August, Virginia Polytechnic Institute and State University exposed information on more than 100,000 job applicants because “someone on our staff goofed” according to the university. In July, an unauthorized employee of New York State’s Office of the Medicaid Inspector General accessed nearly 18,000 records of Medicaid recipients, forcing the organization to examine its data access settings. In May, Washington state’s Administrative Office of the Courts reported a breach in its servers that exposed up to 160,000 Social Security numbers and one million drivers’ license numbers.


These breaches prove that sometimes, the greatest threat comes from within. Additionally, hackers have become more sophisticated and have become skilled at getting into IT environments. As a result, the perimeter of the network is no longer the only concern; it is the endpoints and applications that are putting IT organizations on high alert.

As plans are being made for 2014 regarding both budgets and staffing, there are some critical risks that IT security teams should identify to get ahead of potential attacks. The first, critical step toward protection is to know which endpoints exist on your network. With that visibility, start 2014 off the right way with the confidence of knowing what’s happening on each of those endpoints. This slideshow features five things to look for to improve security and compliance, as identified by Dan Ross, Promisec CEO.

 

More Slideshows

Security40-190x128 Five Ways Encryption Has (or Hasn't) Changed Since Snowden

Findings from a new study take a closer look at the evolution of encryption, analyzing adoption rates of the technology and the evolution of privacy awareness. ...  More >>

1EVacationTips0x Six Tips for CIOs Preparing for Vacation

With summer officially in full force, it’s not always easy to disconnect from the office, especially if you’re running the IT department. Here are tips that can help provide peace of mind while you're away. ...  More >>

Security39-290x195 Five Critical Steps for Handling a Security Breach

No one can stop all security breaches, but you can take steps to dramatically improve your ability to avoid disaster and mitigate damage. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.