Sony Pictures Breach: 10 Lessons For Business Owners And VARs
Submitted by Robert Westervelt on
Security Basics: Get Good At Them
Read version 5 of the 20 Critical Security Controls For Effective Defense. Rate your organizations posture against them. It begins with taking inventory of all the systems and devices in place. Security experts say organizations need to have better patching and configuration management processes. Configuration weaknesses should be rooted out and addressed. Systems that are rarely used or never used should be taken offline. Address wireless security. Minimize network exposure to critical systems. Isolate the business network from other less critical parts of the organizations and restrict access when possible. Consider application whitelisting for critical systems, including point-of-sale systems and systems designed to run manufacturing equipment and other processes. If remote access software is in use, it should be examined for vulnerabilities and configuration weakness.