Tips For Staying Secure in 2006
by Calum Macleod - European Director of Cyber-Ark - Monday, 16 January 2006.
5. Regularly Monitor and Test Networks - This section requires that you track and monitor all access to network resources and data and regularly test security systems and processes. One of the best ways to do this is to have an automated audit trail to assess who had access to data if a security breach was to occur.

The optimum solution guarantees individual logging, while also recording every successful and unsuccessful event, such as login, data access and administrative activities. Additionally, these audit trails should also be stored in a safe manner and be encrypted and signed and unable to be altered manually. Another key feature to look for is the solutionís ability to maintain an audit trail for a predefined period of time, making it impossible to delete the log before the retention period expires.

6. Maintain an Information Security Policy - The responsibility for this falls squarely on your IT department and management team to create, define and enforce an information security policy throughout the organization. The policy should address all relevant rules and regulations defined by regulatory bodies who may have an interest in your activities, and your users should be fully aware of the obligations as well as penalties for non-compliance.

In todayís increasingly regulated business environment itís only a matter of time until the phone call comes from someone inviting themselves for a visit, and hopefully you have all your information readily at hand. After all no one doubts that youíre an honest businessman, but can you prove it. So make the resolution not to be the data breach story of 2006!


Harnessing artificial intelligence to build an army of virtual analysts

PatternEx, a startup that gathered a team of AI researcher from MIT CSAIL as well as security and distributed systems experts, is poised to shake up things in the user and entity behavior analytics market.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Tue, Feb 9th