Seven-Step Security Health Checklist - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Seven-Step Security Health Checklist-4 Next

Paul Mah has written about the plague of Internet Explorer 6.0.  Unfortunately, recent reports show that as many as one in five workers still use IE6, in spite of multiple attempts by Microsoft to get users to migrate to something newer.  Reasons for sticking with IE6 vary and could involve complex issues such as the inability of legacy CMS or ERP systems to work on other browsers.  Regardless, the plethora of vulnerabilities in IE6 makes its mere presence a serious chink in the integrity of your company's defenses.

Just started work at an SMB?  Or perhaps you are heading out on your second interview for the position of IT manager, and will have the opportunity to ask some questions of your own.  To help develop a good feel for the challenges ahead – or perhaps to better appreciate the state of security in your current organization, feel free to do a quick run-through of this security health checklist to see how you fare.

More Slideshows:

More Smartphones that Work for Business New smartphones for today's business user.

Eight Steps to Leveraging Social Networks in Your Job Search Eight steps to focus your online job search.

10 Elements to Look for to Distinguish Agile Enterprise Integration Software Characteristics that can help you identify an AIS.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.