ITO America Business Technology Publication
 
              
About ITO America
IT Optimization Solution Centers
CIO Resource Centers
BSM & ITILv3
BI
Customer Centric Enterprise and Customer Experience Management
Data Center Optimization
Data Center Security and Integrity
Enterprise Mobility
Green IT and Energy Efficient Data Centers
SaaS and Cloud Computing
Service Oriented Architecture and BPM
Unified Business Communications
Virtualization and Data Center Automation
WAN Application Delivery
CIO Thought Leadership and Contributions
 Podcasts
Videos
Webinars
Business Technology Analyst Partners and Media Partners
ITO America Testimonials and Previous Clients
ITO America Media Kit
ITO America Information Technology Optimization News
Contact ITO America staff
ITO America IT Industry Events
ROI Analysis

Business Technology Whitepapers and Articles
Business Technology Article
PDF Document Download

Document:

CISO and there's more...



You must be a logged in to view this document.

Click here if you've lost or would like to change your password?
Register on ITO America Business Technology website

Register on ITOAmerica.com and gain access to countless articles, podcasts, videos and more, contributed by some of the top minds in business technology!


E-mail:
Password:
Verify Password:
Password must be 7-15 characters in length.
Articles in Business Technology
Excerpt:

In light of today's business environment, it has become critical to align security management with business objectives. Staying current with the broad spectrum of complex threats, keeping pace and staying motivated with the manual task makes it challenging.
Recommended best practices include:

  • Turn off ad remove services that are not needed. If malicious code or some other threat exploits one or more network service, disable or block access to those services until a patch is applied.
  • Always keep patch levels up to date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail and DNS services.
  • Consider implementing network compliance solutions that will help keep infected mobile users out of the network (and disinfect them before rejoining the network).


Trent Henry Trent Henry
VP & Research Director, Burton Group

Read More
Chris Wolf Chris Wolf
Senior Analyst, Burton Group

Read More