SHARE
Facebook X Pinterest WhatsApp

Five Things to Do Now for Greater Security and Compliance

2013 was a year full of well publicized data-breaches. In August, Virginia Polytechnic Institute and State University exposed information on more than 100,000 job applicants because “someone on our staff goofed” according to the university. In July, an unauthorized employee of New York State’s Office of the Medicaid Inspector General accessed nearly 18,000 records of […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Jan 10, 2014

2013 was a year full of well publicized data-breaches. In August, Virginia Polytechnic Institute and State University exposed information on more than 100,000 job applicants because “someone on our staff goofed” according to the university. In July, an unauthorized employee of New York State’s Office of the Medicaid Inspector General accessed nearly 18,000 records of Medicaid recipients, forcing the organization to examine its data access settings. In May, Washington state’s Administrative Office of the Courts reported a breach in its servers that exposed up to 160,000 Social Security numbers and one million drivers’ license numbers.

These breaches prove that sometimes, the greatest threat comes from within. Additionally, hackers have become more sophisticated and have become skilled at getting into IT environments. As a result, the perimeter of the network is no longer the only concern; it is the endpoints and applications that are putting IT organizations on high alert.

As plans are being made for 2014 regarding both budgets and staffing, there are some critical risks that IT security teams should identify to get ahead of potential attacks. The first, critical step toward protection is to know which endpoints exist on your network. With that visibility, start 2014 off the right way with the confidence of knowing what’s happening on each of those endpoints. This slideshow features five things to look for to improve security and compliance, as identified by Dan Ross, Promisec CEO.

Five Things to Do Now for Greater Security and Compliance - slide 1

Click through for five things to look for to improve security and compliance, as identified by Dan Ross, Promisec CEO.

Five Things to Do Now for Greater Security and Compliance - slide 2

Is your antivirus up to date and activated?

IT security teams should know, at a glance, whether their endpoints are updated with the latest version of their antivirus software. Hackers can take advantage of an entire network simply by deactivating the antivirus software on one singular endpoint. Is it possible to know if and when this software is out of date or disabled across all endpoints? Yes, but if you don’t, this should be a top priority leading into the new year.

Five Things to Do Now for Greater Security and Compliance - slide 3

Are patch levels up to date?

Use the start of the new year to get a fresh start with patching. Many endpoints in an organization are not up to date with the latest hot fixes or service packs, presenting an opportunity for hackers to wreak havoc. Adopting the mantra “you’re only as good as your last update” in 2014 may help reduce these risks.

Five Things to Do Now for Greater Security and Compliance - slide 4

Are P2P, hacking tools or remote controls running?

Every IT security team should make a New Year’s resolution to stop ignoring the presence of P2P tools such as Limewire or Transmission, hacking tools such as keyloggers, and user-defined remote controls such as GoToMyPC. These technologies make endpoints vulnerable to exploitation and are likely not in line with company compliance standards.

Five Things to Do Now for Greater Security and Compliance - slide 5

Are your compliance standards up to date?

Endpoint management and maintenance is critical to an organization’s overall compliance. If an organization does not have a standard of compliance regarding patch levels or software updates, 2014 is a chance to define these parameters. Taking these steps will make it easier to demonstrate compliance ahead of forthcoming PCI or HIPAA audits in the new year.

Five Things to Do Now for Greater Security and Compliance - slide 6

Have you reviewed local admin privileges?

As evidenced by major attacks in the past year, sometimes the greatest threat to an organization comes from within. Ensure your open share settings aren’t putting sensitive data at risk by establishing visibility into who can access what information and from what endpoints. A common example of this situation occurs in health care organizations. With multiple doctors and nurses accessing multiple workstations, it’s possible to accidentally leave critical information unsecured. However, it’s also an enormous liability as bad as leaving a file cabinet of sensitive patient data unlocked in the lobby of the building.

These threats, and more, can be discovered through a free endpoint inspection tool, setting your organization up for a safe and secure new year.

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.