Security

Key Strategies for Safeguarding IT Resources From Interior and Exterior Threats

Download Now Free registration required

Executive Summary

Systems will never be totally secure, as hackers keep coming up with new uses for old methods of attack. Over the past several years, there has also been an erosion of network perimeters as organizations strive to enable roving users and facilitate interoperation with partners. In addition, regulatory requirements have upped the stakes for failure. A security lapse might now imply fines, operations sanctions or other penalties if the victim organization fails in its security responsibilities. In response to these developments, many organizations have changed tactics. Instead of devoting their efforts to protecting their computers, the focus has shifted to protecting the critical data residing on them. This might seem like a superficial change.

  • Format: PDF
  • Size: 203.1 KB