What You Need to Know about Contingency Planning

In spite of an organization’s best efforts to prevent down time and avoid compromises, failures will still happen from time to time. Former FBI Director Robert Mueller said, “There are only two types of companies: those that have been hacked and those that will be. Even that is merging into one category: those that have been hacked and will be again.” So, what is your organization doing about it? How do you plan for failures and security breaches?

Read more

What You Need to Know about Configuration Management

Configuration management is the managed maintenance of known configurations of EVERYTHING: code, systems, appliances, work flows, facilities, HVAC, etc. Keeping track of, confirming, testing, backing up, verifying, restoring, and documenting configurations across the organization is essential to maintaining stability, consistency, reliability, and security.

Read more

What You Need to Know about Access Control

A major component of IT security is determining who is allowed into your structure, both physically and logically, and what they do once they have gained access. Access control determines who has how much access. To get control, organizations must lock down their systems, including hosts, networks, applications, data stores, and data flows.

Read more