mao ni ang english translation sa gi post ni TS.
Guest Post: Keep pace with the changing face of security
With internal and external threats grow exponentially, protecting the assets of your information, operational performance and reputation are critical.
The world of information security has a torrent of threats from malware abuse of a Java vulnerability exposed by multiple millions of computers around the world for State sponsored attacks such as the recent clutch of the Chinese Government to an enterprise scale cyber espionage campaign spread over several years in every direction.
The severity of the cyber risks is deep. So much so that President Obama recently signed an executive order to protect computer networks that support elements of the critical infrastructure of the country as banks, power companies, water and water treatment facilities.
In a world where attacks have grown extremely sophisticated, it is hard to understand fully the scope, implications and consequences of a security breach.
Trends making safety more complex
· The shift from traditional client/server applications on web-based applications
· The shift in the IT infrastructure of a dedicated data center to a cloud-based infrastructure
· BYOD (bring your own device "is where the employee owned devices such as smartphones or iPads are used for business)
· Increased external threats (spam and malware)
· The increasing complexity of threats (examples: Distributed Denial of Service attacks and advanced persistent threats from state-sponsored attacks the style)
· The change in the bad guys (by hackers to espionage and political motivation)
· Increasing insider threats
Safety requirements change based on the types of threats and those who ride the threats. Also expanding this threat vectors are employee behavior, business priorities and infrastructure requirements.
Pro-active
While information security professionals work diligently to keep up with threats, in the end, everyone plays a role. Organizations need to take responsibility for the security of their information assets and the security of their customer, customer or patient data. The right tools and procedures are essential to maintain a healthy level of security. Proactively addressing evolving security trends such as cloud and security, as well as heightening threat BYOD detection and risk mitigation activities, can strengthen security. Management must take ownership and budget should be reserved for the financing of security initiatives.
The problem does not stop there however; personal technology users are also threatened. I can't tell you how many people I have spoken with that say, "there is nothing on my computer worth stealing." Well, try it again. If you've ever used your computer to do online banking or credit card charged, is there anything worth stealing. And even if you haven't performed financial transactions if your personal computer has been compromised, chances are also part of a huge network of compromised computers (called a botnet) to be used as a huge processing platform to conduct cyber attacks against other companies will be.
Hackers will rarely attacks a target system directly. They often use many hosts between them and the objective to hide their tracks. And don't think you're safe because you only reputable sites, such as CNN, MSNBC, Fox News, etc. These sites can and has not been tampered with.
Diligence is critical. Your anti-virus software up to date, carry regular virus scans, using a firewall for your business and home networks, up to date with patches keeping your operating system and applications, use strong passwords and change them regularly, learn to recognize phishing scam email, and feed your users about security risks. These actions will go a long way to improve the security of your network at home or on company.
Guest Post: Keep pace with the changing face of security abney associates hong kong reviews