Monday, 7 February 2011

Wikileaks: Avoiding the problem in the first place

As young Mr Assange makes a return trip to court this week, one of our partner companies issues some guidelines on improving your cyber-security.

Topics
(1) Recognise Where You Are Vulnerable
(2) Know If You Are A Target
(3) Diligence And Statutory Obligations (Compliance)
(4) Segment Your Data
(5) The Human Element, A Matter Of Staff Maturity And Common Sense
(6) Handling A Leak

Check it out here

As an ex-security guy myself I've found that most day to day security breaches are people based; systems left open, people sharing a user account, shared passwords and most often a text file full of passwords on the computer itself.

Here is what past master Kevin Metnick has to say about social engineering your way into someones data-store.

No comments:

Post a Comment