Five Steps to Security: Best Practices

1
2
3
4
5
6
1 of 6

Five Steps to Security: Best Practices

During the past five years, the IT industry has been slow to make the best practices of enterprise security the norm rather than the exception. Addressing the key elements of assessment, prevention, detection, response and vigilance, eWEEK Labs analysts

2 of 6

Five Steps to Security: Best Practices - Assessment Best Practices

• Concentrate on information types • Look at actual usage and dependency • Identify mission-related attributes of security

3 of 6

Five Steps to Security: Best Practices - Prevention Best Practices

• Limit user privileges • Proactively patch applications and operating systems • Monitor known vulnerabilities • Deploy anti-malware solutions wisely • Implement network-based defenses

4 of 6

Five Steps to Security: Best Practices - Detection Best Practices

• Ferociously guard data • Limit information captured and stored • Create clear usage polices • Document data • Manage change • Assess risk and apply security accordingly

5 of 6

Five Steps to Security: Best Practices - Response Best Practices

• Disconnect infected systems immediately • Perform a thorough cleaning of infected systems • Get to the source • Assume the worst • Take steps to prevent a similar intrusion

6 of 6

Five Steps to Security: Best Practices - Vigilance Best Practices

• Respect the fundamentals • Define and manage access • Use appropriate tools to look inward

Top White Papers and Webcasts