The 8 Essential Elements of Internet Security
Source: Black Box
The evolution of Internet content toward social media and Web 2.0-based sites presents new challenges for organizations. Critical applications have become Web-based, and non-browser generated Web traffic - think iTunes and peer-to-peer networking - has exploded. One has a business Internet connection for two things: Web-based applications (Web site admin tools, CRM tools, collaboration sites) and Web browsing (to do critical research). Of course, some of the employees use their time and Internet connections for non-critical ends, such as checking personal e-mail or streaming music or video. The trick is to maximize the company's broadband capacity and contain related costs while also protecting the assets from malware and viruses.