Tuesday, August 29, 2006

create an IT defense checklist

Take a proactive approach on data security as part of an overall IT strategy.

Inventory data - What do you have that's most at risk?

Consider encryption - Many people are encrypting more, both data in transit and at rest.

Encrypting isn't enough - Verify the source and its destination.

Avoid the "Bagel Defense" - Use firewalls, but also protect key data inside and monitor it for access.

Watch your firewalls - Use automated tools for monitoring firewall traffic.

Think beyong the network - Know all ways data can leave the network. Consider what to do if a laptop is lost or stolen.

Educate everyone - The more is known about security, the safer the data is.

Invest wisely - Don't be content with one security project. Consider going further.



No comments: