How to Protect Vital Information
How to protect vital information By taking the following three simple steps, federal agencies can employ a proactive approach to prevent breaches and protect vital information assets-avoiding the devastation and havoc that even one rogue person can inflict. The three steps are:Federal agencies must assess who has access to what data, enabling them to understand and manage access as appropriate. Step No. 2: Apply appropriate policies to protect sensitive information Federal agencies must create an actionable plan and put it into place, applying privileged passwords and access management controls throughout each level of information. Step No. 3: Update security and access credentials regularly to monitor and maintain control By implementing a regimented program to automatically update access management and passwords, federal agencies will ensure that the right people have the right amount of control over vital information. In conclusion, by taking the necessary steps to address these security challenges, federal agencies will be positioned for better governance, less risk and greater compliance. This will ultimately serve to protect the public's trust and keep national security risks at bay. Robert Grapes is Chief Technologist at Cloakware. Robert has more than 17 years of professional experience in the technology sector. Prior to joining Cloakware in 2004, Robert spent many years with Entrust Technologies as a software toolkit product manager, with Cognos in vertical analyst relations and with Allen-Bradley as a control systems automation developer. Robert's expertise on enterprise security and Governance, Risk Management and Compliance (GRC) has enabled many large government and financial service organizations to meet their audit requirements for PCI-DSS, FISMA, FERC and other regulations, while reducing risk and improving operational efficiency. He can be reached at firstname.lastname@example.org.
Step No. 1: Know who has access to privileged information