New Year Resolutions: Computer Security
by Calum Macleod - Senior IT Consultant at Cyber-Ark - Monday, 27 December 2004.
Bookmark and Share
December saw yet another Government minister fall prey to the wonders of email. Email is a great invention, I simply can’t imagine life without it, but I believe that frequently we forget that “the keyboard is mightier than the sword”, because it has this nasty habit of biting from time to time. Mind you our public servants continue to seemingly totally miss the point. Using email is not intended to be used by politicians as a means to demonstrate to the rest of us that they are IT literate! Mind you it seems that government has found the answer – Whole scale deletion of mail is the latest Whitehall brainwave. Not only could you or I end up as a guest of HM for doing something similar but it seems they still haven’t quite got the point. They’ll probably delete them before they send them for security reasons!

So there we have it, a year of unfortunate mishaps, and many more besides that. But how do you avoid being next year’s talk of the town...

Well maybe a few resolutions would help:

1. I resolve to put in place security layers such as File Access Control and Version Control according to our company’s policy so that only authorized users will be able to delete or modify documents.

2. I resolve to implement monitoring and auditing features to insure that all activities are logged, and that reports can be issued and sent according to a notification process.

3. I resolve to put controls in place to ensure that users cannot copy confidential information to unauthorised systems.

This would be at the very least a start, but in the event that you find this all too much trouble, and you think that this kind of stuff only happens to other people.

4. I resolve to look into a good personal liability insurance policy… because the chances are I might need it.

Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //