3 types of Technology Risk (and what to do about them). Post 2 of 3

by Michael Anderson

July 21, 2010

  • This field is for validation purposes and should be left unchanged.

In this series, we’re looking at the different types of technology risk.  Our last post covered External Attacks, and the need for a coordinated, multi-front effort to protect your network.

Today’s topic…

2. Unauthorized Access to Information

Information can be a company’s most critical asset, and protecting it against unauthorized access needs to be a top priority when addressing IT security.  Unauthorized access can originate from outside the firm or inside, and measures are required to prevent both.

External Breach

Perimeter Security

As we discussed in Post 1, ensuring properly configured firewalls and log monitoring are essential to protecting the corporate network from unauthorized external access.

Data Encrytion

Companies who store sensitive data, including client details and credit card numbers need to take specific steps in both storing and transmitting this information. Companies should familiarize themselves with applicable regulations, including the Personal Information Protection and Electronic Documents Act (PIPEDA) and the Payment Card Industry (PCI) Data Security Standards. Industry-specific regulations such as the Health Insurance Portability and Accountability Act (HIPAA) may also apply.

Internal Breach

While external threats are real, the greatest risk to your company data is more than likely your employees. Forrester Research estimates that up to 85 percent of enterprise security breaches involve internal people and resources. And according to Gartner, “organizational costs of a sensitive data breach will increase 20 percent per year over the next two years.

Putting the appropriate conrols in place can greatly reduce the likelihood that you will face an internal security breach. Richard Stiennon at IT-Harvest put it best when he said ‘Identity and Access Management tools are the single most valuable defense you have against the insider threat’. Some best practices in this area include:

– Clear guidelines and processes for requesting file access and establishing group policy
– Requirements for strong passwords, forced scheduled password changes, and auto-screen locks
– Web security and content filtering
– A well-defined employee exit process to ensure ex-employees do not retain access to corporate networks after their departure

If you don’t have a security plan in place, or need some guidance on where to start, get in touch – we’d be happy to help.

In our next post, we’ll look at Technology Risk #3 – Loss of use / Downtime.

If you’d like to keep up-to-date with our posts, you can follow us on Twitter (@365tech).


Recent Posts

Social Sharing

Leave a Reply

Your email address will not be published. Required fields are marked *

Cephalexin Dog Skin Infection Viagra Online Usa Prorium Cytotec Original 20mg Cialis Online Pharmacy Priligy Generico Opiniones Prevacid Purchase Online Purchase Dapoxetine Online Viagra Superactive Plus Priligy Espana Prospecto Viagra Online Store Was Ist Kamagra Gold Propecia Online Prices Generic Levitra Kamagra Deutschland Levitra Propecia Sintomas Cheap Viagra Tablets Find Progesterone 200mg Viagra Wholesale China Cialis Free Offer How To Stay Erect Longer Prezzo Cialis Da 5 Mg Cheapest Cialis Cialis Cardiovasculaire Effet Cialis Viagra Levitra Buying order accutane online no prescription Sinequan Viagra Online Blue Amoxicillin Dosage Days portion deducted or withheld and is entitled to a refund of any amount paid that These regulations may be cited as the Payday Lenders Regulations.At Lenders Club We make it a point to offer our clients with some fantastic deals on unsecured loans. online payday loans Learn how Kabbage works in this second video Link any or all of the online services you use to qualify instantly.STAT.Can I Purchase Provera Wakefield Propecia Low Price Propecia E Inseminacion Artificial Zithromax Price Walmart Cheap Cialis 20mg Ciao Propecia Cheap Viagra Pe Levitra Lowest Price Le Viagra Fr Stendra Us Without A Script Pharmacy Order Cheap Viagra Bentyl With Free Shipping In Internet Overseas Pharmacy Clomid Cycle Menstruel viagra online prescription Cialis Piano Terapeutico Compra Viagra A Reembolso Buy Generic Viagra Buy Wellbutrin 150mg Singapore Fedex Shipping Stendra No Physician Approval Generic Cialis Usa Producto Propecia Viagra Commander France levitra without rx in the united states Effetti Collaterali Cialis Cialis Thailandia By Cheap Viagra Amoxil Mrsa Buy Cheap Clomid Without Prescriptions How Much Is Accutane Viagra Online Bari Kamagra In Usa Viagra Discount Reputable Online Pharmacists Amoxicillin Wheat Allergy Cialis Usa Compra Viagra Contrareembolso Buy Orlistat Online Uk Cheap Kamagra Tablets Nexium Online Canada Uk On Line Pharmacy Levitra Pills Online Cialis 5 Mg Diario Tuenti Con Propecia Cheap Generic Viagra Propecia Pve Levitra 20 Mg Problemi Levitra Order Viagra Rezeptfrei Nurnberg
KelVumneredWednesday, June, 21, 2017

Koi Amoxicillin Dosage Dapoxetine Tablets Get Real Cheap Hydrochlorothiazide Medicine Pills Store Sildenafil Sale Price Generic Viagra Comprare Cialis Generico In Italia Nizagara For Sale Cheap Kamagra Pills Amoxicillin For Sinus Infections Cialis 10 Mg Receta Levitra Generic Online Buy Propecia Black Online Viagra Ticino Tadalafil Generic Is Penicillin The Same As Amoxicillin Amoxicillin Kidney Infection viagra prescription Pharmacy No Prescripition
KelVumneredThursday, June, 15, 2017

http://undeclaiming.xyz norsk kasino http://undeclaiming.xyz - norsk kasino
SailiprotThursday, May, 11, 2017

Worried about your IT costs?

Almost any IT problem we encounter can be classified within 5 different areas – we call them the ‘Big 5’ IT Worries. Do you want to learn how much the ‘Big 5’ IT Worries is costing your business?

Imagine if you didn't need to worry about the cost of each problem. Or better yet, if there was support in place to prevent the problem from occurring in the first place. Small to mid-sized businesses aren't often able to employ an in-house IT department, but with support from 365 Technologies, you're covered as though you had one.

Wait, before you leave,
Request your free consultation.

Click the link below to more learn more about how 365 can deliver Worry-Free IT to your business.
Request Free Consultation