Tag Archives: Security

Six Strategies for Achieving Connected Security

7838.security.png-550x0

A Holistic Approach is Critical for Securing Your Network

But a holistic approach is probably most critical when it comes to securing your network. Just when you think you have your network secured, there is always another threat — from outside or from inside. These threats have many names: spear phishing, botnets, zero-day threats, distributed denial-of-service (DDoS) attacks, insider threats and former employees. They are determined to exploit disconnected security — security tools, processes, user profiles and information that are separated in silos, leaving dangerous gaps in between.

The increasing complexity of IT environments only increases these gaps, providing attackers with many new opportunities to exploit. Consider the number of operating systems you are now slated to secure and the number of BYO devices that are a normal part of your organization’s operation, from smartphones and tablets to network-connected devices such as printers, scanners and kiosks. Yet BYOD is still in its infancy — just 24 percent of organizations say that BYOD is widely used and supported. And the Internet of Things (IoT) promises complexity on a scale that’s difficult to fathom, with analysts predicting that 6.4 billion connected things will be in use worldwide in 2016, and that the number will swell to 20.8 billion by 2020.

There’s no turning back. Your users want the mobility and flexibility BYOD provides, and your organization needs to remain agile and attractive to both current and prospective talent. But neither can you ignore the security threats that continue to grow in both number and sophistication.

6 Strategies for Achieving Connected Security

By abolishing technology tunnel vision and adopting a holistic, connected approach to security, you can embrace BYOD and new technologies while also protecting your IT network and systems from attackers. Here are the six key strategies:

  1. Discover and inventory all devices — Establish a complete and accurate inventory of all connected devices and keep it current with IT asset management software. You can’t secure what you don’t know about.
  2. Keep software up to date — Make sure that you are patching your operating systems and applications regularly. Using the latest versions of software is the starting point for eliminating vulnerabilities. Gartner, Inc., reports that nearly a third (30 percent) of system weaknesses can be resolved through patch management.
  3. Maintain antivirus software on all endpoints — Antivirus software was once considered the only line of defense against attackers. Although today you need other strategies as well, it’s still imperative that current antivirus software be in force on all of your managed systems.
  4. Deploy a modern firewall — Next-generation firewalls are no longer just for larger organizations. They offer critical new technologies that provide added protection and peace of mind, and they can be both affordable and easy to manage for organizations of any size.
  5. Conduct regular IT security audits and vulnerability assessments — With OVAL and SCAP scanning, you can get ahead of the curve in finding and remediating security holes in your IT endpoints.
  6. Encrypt your data — Security from the data level to the cloud is today’s mantra. Start with endpoint data encryption, which provides a solid defense against data loss from lost or stolen devices.

Drone Technology Will Revolutionize Security

 

DroneAccording to John Minor, Campus Safety Magazine advances in drone technology will revolutionize campus security.

And he is on target, so to speak. Done technology will also revolutionize the tactics and techniques for the military and law enforcement in a world becoming increasingly more violent and crime prone. Gone are the days when commanders and cops sent out scouts to surveil and predict enemy or crooks movement. Now, they can put up a drone eyeball and kill the enemy and effectively stop the crooks. Drone bomb drops are now feared by the Islamic Terrorists and likewise, legitimate law enforcement surveillance technology like wire taps and drones will also send shivers up the spines of drug cartels, mafia members, and street thugs. Information is power and drones will certainly send timely information/intelligence to those who keep us safe because.

Commercial drones can be expected to become a key part of future security and surveillance systems, and serve as an especially good fit for the security needs of universities and schools. Drones offer many benefits that stationary cameras cannot, and act as a fast-launching, easy-to-operate, portable and cheap replacement. Unlike fixed video surveillance systems, drones can be deployed at a moment’s notice, and monitor hard-to-reach and high-risk locations. The technology can also provide first responders with real-time situational awareness during campus emergencies. Drones offer a more comprehensive security surveillance system, and could likely be used for many security applications–potential areas including banks, transportation, construction sites, and more. Some of these applications are already underway, such as at BP, which uses drones to inspect the security of oil facilities in Alaska. The company employs 6-foot-long, fixed-wing Puma Aerovironment drones to conduct aerial surveys, and was the first company to obtain FAA approval to do so.

See additional information on drones:  The Digital Age