Seven-Step Security Health Checklist - Slide 2

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Seven-Step Security Health Checklist-2 Next

Is antivirus software deployed? Is a uniform application suite deployed, or does it consist of a smorgasbord of 90-day evaluation copies together with those purchased off-the-shelf at various times of the year? Are the definitions up to date? Additional clues on the level of seriousness pertaining to security can be determined by how they are deployed. Are they stand-alone consumer-level deployments, or is a central server used to track the health of individual machines and push the requisite updates to them?

Just started work at an SMB?  Or perhaps you are heading out on your second interview for the position of IT manager, and will have the opportunity to ask some questions of your own.  To help develop a good feel for the challenges ahead – or perhaps to better appreciate the state of security in your current organization, feel free to do a quick run-through of this security health checklist to see how you fare.

More Slideshows:

More Smartphones that Work for Business New smartphones for today's business user.

Eight Steps to Leveraging Social Networks in Your Job Search Eight steps to focus your online job search.

10 Elements to Look for to Distinguish Agile Enterprise Integration Software Characteristics that can help you identify an AIS.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.