Specialist data centre news for Europe, the Middle East & Africa
Best security practices
01 Feb 11
Close security gaps: laptops travel, and contractors and visitors connect to your network. Protect network endpoints, not just perimeters.
Integrate defences: combine anti-virus, firewall, intrusion detection and vulnerability management at endpoints, and add encryption if they travel.
Patch software: threats evolve, so close vulnerabilities quickly by applying updates from Microsoft and other software providers.
Update virus definitions: keep your virus definitions up to date so your anti-virus software recognises new threats.
Alert employees: warn them about attachments and links in unexpected email, and in software downloads before they are scanned for viruses.
Don’t invite trouble: file-sharing services and websites may install malicious code automatically. Stop them with training, policies and software.
Strengthen passwords: require passwords that mix letters and numbers – never names or dictionary words – and change them often.
chedule backups: implement and enforce backup schedules for your servers, desktops and laptops – and automate as much as you can.
Back up complete systems, too: a ‘down’ server means lost business, so back up the operating system, applications, configurations and settings, not just files.
Keep off-site backups: make sure files and systems can survive fire, flood, vandalism, sabotage, loss of your facility, or even a regional disaster.
Test backups: don’t wait until recovery to discover a resource, process or technical shortcoming – test the entire cycle.
Get help: find a local IT partner whom you trust, who understands and can help with both your business and technical requirements.
Whitepaper: How to make sure your security architecture keeps up with surging network speeds
The annual cost of cybercrime is expected to exceed US$6t by 2021 with a large contributor being the sheer amount of data that requires processing.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?
Whitepaper: How to explain why IT security needs more budget
Do you want to convince your higher-ups that IT and security need more budget?
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."