Monday, March 17, 2008

Is protecting your company s data a lost cause?

The Society Technologies d & 39; aujourd hui & 39;, with more efficiency & 39; also vulnerable to threats. Security of & 39; information can be a constant struggle for companies, how they are fighting for & 39; continuing evolution of computer data hazards.
Companies suffer from data security in the wake of the leak of something stole a laptop stolen from hackers on paper records. According to the 2006 Cost of Data Breach study The Ponemon Institute, the data for businesses against the average total cost of & 39; a sum of US $ 4.7 million, or $ 182 per customer records. Companies with a poor solution of data protection may not be just because of the legal problems of data security laws harsh, but if the data leaks occur, most companies can be in & 39; image and public relations problems posed by scrutiny.
So what you can do for the security of data on your computer more effectively? Here are some steps you can take to ensure that your solutions of data protection are still in Tip-Top-shape.
Evaluate often. Often do you think about the security of data on your computer, the functionality of data protection and & 39; alternatives cover all aspects vulnerable. In addition, it is a security policy data with frequent testing so that your company can their security solution up-to-date.
implementation and the implementation of strategies & 39; passwords . Make sure your employees have passwords that the number of letters, numbers and special characters. As part of the system, define the parameters of your employees to make their passwords regularly, as this will contribute to the stability of the system security.
Watch your VPN. If you have employees occupied in a remote location, you notice that those users can collect viruses or malicious programs on their computers not at home, which means that the threats might jump on the network. So, if your employees, make sure that they operate in & 39; security & 39; protects the company issued laptops.
Monitor your Wireless. Having secured the Wi-Fi on your point of access & 39;, should continue to inform you about the risks. Some data thieves with a tower & quot; evil twin & quot;, where she false wireless network, which has a name very similar to you in a tower for workers in demand on the network of these swindlers, where it is possible to connect the user & 39; Information.
Hack your own wireless network. Rent an external auditor to conduct a penetration & quot; test & quot; your network, even if it seems strange to & 39; intrusion into your network, you have an intruder from the for your network, and is probably the most effective way to discover what your solutions data protection May Lack.
Always encrypt your data. Regardless of where the data is stored physically, with strong encryption is imperative if data.
The protection of sensitive data without erasing. Collection of data you need, and place them in a secure system, but if c & 39; is once again, make sure you delete the completely.
If carefully on your computer, data and solutions Security, which do, it& 39;s a shift in tears, you will have a lot less risk more of your data in the wrong hands - save your company from the consequences of accountability and public scrutiny of costs.
-- About the author & 39;: David Meizlik is the Product Marketing Manager for Security Solutions at Websense, Inc., a leading provider of Web content and security solutions, which is headquartered in San Diego, California, USA United States. Its responsibility includes the positioning of the product, Go-to-Market of the strategy and development, market and competition analysis, the program for the development and management of all outbound marketing activities for the products of Websense Security . Meizlik served as director of marketing for new opportunities d & 39; business, technology and marketing partners responsible for the construction of Websense Web Security Ecosystem, an alliance of more than 38 technology and distribution partners. For more information about Websense & 39; visit Websense.com. gisela evelyn



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com

No comments: