Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.
This is a sidebar to Security Sieves: Misused Technology Leaving Networks Vulnerable.
Before companies invest more of their budgets on new security technologies, they should make sure they’re properly using what they already have, say industry analysts and security consultants.
“Are IT technologies being used efficiently? No. Are they optimized? No,” says Michael Rasmussen, director of research and information security at Giga Information Group. “Does it mean companies need to outsource it all? No…they can handle this.”
Paul Robertson, director of risk assessment at Herndon, Va.-based TruSecure Corp., says IT and security administrators need to take the time to focus on what’s already in their shops.
“If you have things that will provide you with protection, and you’re not using them properly, it’s a waste,” says Robertson. “Obviously, they’re not getting the best value for the dollar.”
Here are some suggestions — from corporate users, analysts and security consultants — for making sure your technology is being optimized:
Don’t start buying software and devices until you know specifically what you’re trying to protect. What are the areas where key data is being stored, and how does that data affect the enterprise?
Make sure you’ve adopted your industry’s own security standards and best practices;
Develop granular security policies;
Have actual security administrators instead of making security part of an IT worker’s job;
Educate all of your employees about the need for security and how they can help protect the company, its information and, ultimately, their own jobs;
Implement technologies as needed, taking the time to configure and test them;
Stay current on all patches and updates;
Get an external self-assessment (Don’t just look at pure technical risks. Look at the business risk model. For instance, if there is the same vulnerability on two different systems, you need to understand the business impact of both so you can prioritize the fixes.);
Make sure the people running things like a firewall are trained to do so;
Don’t immediately cave in to every user demand for new features and protocol access. Take the time to weigh the business advantage with the security risk;
Make sure you understand how new technology affects your existing system. Microsoft’s Windows NetMeeting, for instance, could open up tens of thousands of UDP ports if not handled properly;
Don’t ignore technologies that could act as security devices. For example, put filtering rules on the border routers between the company and the ISP;
Give security administrators they authority they need to weigh in on or make network decisions;
Filter attachments on your email gateways;
Don’t allow users to connect to the internal network over a VPN and to the Internet at the same time, and
Don’t allow users to connect to the internal network via a personal home computer.
RELATED NEWS AND ANALYSIS
-
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
-
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
-
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
-
Top 10 AIOps Companies
FEATURE | By Samuel Greengard,
November 05, 2020
-
What is Text Analysis?
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
-
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
-
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
-
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
-
Top 10 Chatbot Platforms
FEATURE | By Cynthia Harvey,
October 07, 2020
-
Finding a Career Path in AI
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
-
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
-
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
-
Top 10 Machine Learning Companies 2020
FEATURE | By Cynthia Harvey,
September 22, 2020
-
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
-
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
-
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
-
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
-
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
-
Anticipating The Coming Wave Of AI Enhanced PCs
FEATURE | By Rob Enderle,
September 05, 2020
-
The Critical Nature Of IBM’s NLP (Natural Language Processing) Effort
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
August 14, 2020