Reduce Risk: Six Vulnerable Points Enterprises Need to Consider

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Reduce Risk: Six Vulnerable Points Enterprises Need to Consider-4 Next


The mobility domain is critical to assessing risk arising from mobile users of enterprise resources, including laptops and mobile devices, and other hardware covered by policies such as bring your own device (BYOD). In order to protect sensitive intellectual assets, an effective BYOD plan must include formalization of policy and enforcement mechanisms that cover access control, acceptable usage and remote wipe capability in case of loss.

Because the integrity of intellectual assets is at its most vulnerable during transit, a foreign travel security policy should be adopted to protect against the growing sophistication of competitive intelligence adversaries. This includes the adoption of best practices and behaviors during transit, which includes taxicab, airplane and hotel, as well as after arrival at final destination and return.

In light of recent incidents such as the Target breach and the Heartbleed bug, security remains top of mind for IT professionals. While most security solutions address only cyber-based threats, organizations need a more proactive and holistic approach to find, fix and protect potential vulnerabilities and reduce the likelihood of a security incident. In this slideshow, Armond Caglar, senior threat specialist at TSC Advantage, presents the six domains that every organization needs to examine to reduce risk.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.