19 February 2014

Just been reading cyber-security-solutions-arent-working on Information age, and it surprised me that for all the security technology deployed these days businesses still believe in the fear and hype that vendor marketing teams put together!

Keep it simple audit and classify your data, examine the current security precautions, processes and policies in place to protect your data , identify potential risks and threats and then design / implement / document and monitor a sensible security strategy around your critical data and systems, and finally most importantly of all educate your administrators and user on why they need to stay safe online at home and work as they are still the first and most important line of defense.

Mobility and BYOD should not be a business inhibitor if your data and systems are already secured and monitored correctly, there are no band-aid's or quick fixes just common sense!

Comments

Popular Posts