8 Steps to Smarter Smartphone Use
If you have a smartphone, you have a fully capable computer in your pocket that has an always-on connection to the Internet that is tracking your every move. A bit scary, right?
Read moreIf you have a smartphone, you have a fully capable computer in your pocket that has an always-on connection to the Internet that is tracking your every move. A bit scary, right?
Read moreIn spite of an organization’s best efforts to prevent down time and avoid compromises, failures will still happen from time to time. Former FBI Director Robert Mueller said, “There are only two types of companies: those that have been hacked and those that will be. Even that is merging into one category: those that have been hacked and will be again.” So, what is your organization doing about it? How do you plan for failures and security breaches?
Read moreConfiguration management is the managed maintenance of known configurations of EVERYTHING: code, systems, appliances, work flows, facilities, HVAC, etc. Keeping track of, confirming, testing, backing up, verifying, restoring, and documenting configurations across the organization is essential to maintaining stability, consistency, reliability, and security.
Read moreIn spite of your best efforts to prevent compromise and downtime, they will occur. Thus, you must not only plan to prevent problems, you must also plan to handle failures when they occur. This type of planning is known as incident management.
Read moreA major component of IT security is determining who is allowed into your structure, both physically and logically, and what they do once they have gained access. Access control determines who has how much access. To get control, organizations must lock down their systems, including hosts, networks, applications, data stores, and data flows.
Read more