As young Mr Assange makes a return trip to court this week, one of our partner companies issues some guidelines on improving your cyber-security.
Topics
(1) Recognise Where You Are Vulnerable
(2) Know If You Are A Target
(3) Diligence And Statutory Obligations (Compliance)
(4) Segment Your Data
(5) The Human Element, A Matter Of Staff Maturity And Common Sense
(6) Handling A Leak
Check it out here
As an ex-security guy myself I've found that most day to day security breaches are people based; systems left open, people sharing a user account, shared passwords and most often a text file full of passwords on the computer itself.
Here is what past master Kevin Metnick has to say about social engineering your way into someones data-store.
Monday, 7 February 2011
Wikileaks: Avoiding the problem in the first place
Labels:
security,
virtual machine company,
wiki,
wikileaks
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment