Now That's Scary…..
Viruses, spoofing, Denial of service attacks, malware,
social engineering, and zombie attacks…. this list of threats against your
network appears to come straight from a horror movie! What can be done to
protect your company's systems and data from these and other monsters?
Protection Mechanisms
There are several ways to protect your company against
threats such as Paranormal Email Activity and The Return of the Living Hackers.
Utilizing the Sphere of protection is a good way to see how technical controls
will help you defend against such threats.
The left side of the sphere shows the controls that defend against outside
threats and the right side shows those that defend against those pesky inside
attacks. Since People can access all layers of the Sphere – the right side of
the Sphere must apply a different approach to security. People have to become a
safeguard of the system. Members must be effectively trained, implemented and
maintained – or they will also represent a threat to the data and system.
There are thousands of stories involving technology nightmares. For instance, a nonprofit in Maine called People Plus accidentally posted a portion of its membership database on its website. This data included contributions, addresses, numbers, and contact information. This private information sat exposed on their website for two weeks before they detected the breach.
Network World also has a great page that lists several "True Life IT Horror Stories". Click on the image below to access it:
So don't let your organization become the next "Nightmare on Data Street" – make sure you are placing protection mechanisms in place to safeguard it!
BOO;)
Here are some more links about Protection Mechanisms that you might find useful:
No comments:
Post a Comment