Reduce Risk: Six Vulnerable Points Enterprises Need to Consider

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Reduce Risk: Six Vulnerable Points Enterprises Need to Consider-4 Next

Mobility

The mobility domain is critical to assessing risk arising from mobile users of enterprise resources, including laptops and mobile devices, and other hardware covered by policies such as bring your own device (BYOD). In order to protect sensitive intellectual assets, an effective BYOD plan must include formalization of policy and enforcement mechanisms that cover access control, acceptable usage and remote wipe capability in case of loss.

Because the integrity of intellectual assets is at its most vulnerable during transit, a foreign travel security policy should be adopted to protect against the growing sophistication of competitive intelligence adversaries. This includes the adoption of best practices and behaviors during transit, which includes taxicab, airplane and hotel, as well as after arrival at final destination and return.

In light of recent incidents such as the Target breach and the Heartbleed bug, security remains top of mind for IT professionals. While most security solutions address only cyber-based threats, organizations need a more proactive and holistic approach to find, fix and protect potential vulnerabilities and reduce the likelihood of a security incident. In this slideshow, Armond Caglar, senior threat specialist at TSC Advantage, presents the six domains that every organization needs to examine to reduce risk.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.