Configuration: the forgotten side of security

Thursday, 14 December 2006, 10:43 AM EST

When the average computer user thinks about security, they usually think about reactive measures like anti-virus programs or security patches -- responses to a specific threat. Such measures play a role in securing a workstation or a network, but they are often less than half the story. A more efficient approach is to configure a system securely from the start. Yet the realities of the software market and IT management, as well as efforts to increase user convenience, often mean that security by configuration is neglected, despite the straightforwardness of most of the steps needed to obtain it.

At Linux.com

[ Read more ]




Spotlight

Email scammers stole $215M from businesses in 14 months

Posted on 29 January 2015.  |  In 14 months there have been nearly 1200 US and a little over 900 non-US victims of BEC scams, and the total money loss reached nearly $215 million.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Jan 30th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //