Deset strategických bezpe?nostních iniciativ pro každou organizaci
22.02.2010Linda Musthaler:
- Perform and maintain a complete asset inventory, and decommission old systems.
- Monitor your third-party relationships.
- Segment your network into as many zones as feasibly possible.
- Rethink your wireless implementation.
- Encrypt your sensitive data.
- Investigate anomalies -- they could be warning signs.
- Lock down user access.
- Use multifactor authentication everywhere possible.
- Implement and follow a formal Software Development Life Cycle (SDLC).
- Don't forget to educate everyone.
Zdroj: http://www.networkworld.com/newsletters/techexec/2010/022210bestpractices.html?hpg1=bnAutor: JP