2003 Survivor's Guide to Security

Monday, 16 December 2002, 11:54 AM EST

Consider stalled IT budgets and a lingering feeling of insecurity a mandate to get a handle on new security technologies and products in 2003. Of course, with vendors bombarding you with an ever-widening range of gee-whiz security gizmos, that's easier said than done.

The first step: Identify what you need to protect, from physical assets to digital data. Then consider how your applications function, what access these applications and your users need, and who will be using the information.

You're probably thinking, "Easy for you to say." Out there in the trenches, after you finish configuring your firewall, deploying your VPN, monitoring your IDS, updating your virus scanners, examining your logs, getting current on the latest vulnerabilities, keeping up with the endless stream of patches and putting out fires, there's precious little time to fine tune your security architecture.

[ Read more ]




Spotlight

Email scammers stole $215M from businesses in 14 months

Posted on 29 January 2015.  |  In 14 months there have been nearly 1200 US and a little over 900 non-US victims of BEC scams, and the total money loss reached nearly $215 million.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Jan 30th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //