Access "Lack of SMB security opens door to online criminals "
This article is part of the June 2011 issue of BYOD means creating a new security game plan in the enterprise
Hello! I’m talking to you! Yes, you, the IT director or network manager at your average SMB. I have a message and hopefully you listen loud and clear: There are no weeds tall enough in which you can hide. There it is; said it. Your company’s relatively small size, which for so long led you to believe you A) were not in the crosshairs of hackers; and B) you processed and stored nothing of value that would interest a criminal operating on the Internet, is in fact just what the bad guys are pining for. They love small fish. They get a twinkle in their eye because they know you’re busy, under-staffed and barely have a network firewall configured properly, much less an incident response plan. Now we’re not talking Mom and Pop stores here. We’re talking, for example, franchises in a large restaurant chain left on their own to manage IT. Care to guess where IT security falls on the list of priorities for those franchises? We’re talking about relatively small operations, Level 3 and 4 PCI merchants for example, processing credit card transactions on wonky ... Access >>>
Premium Content for Free.
Get actionable results from a security information management system
by Andreas M. Antonopoulos
In order to get the best results, you need to limit your goals for SIM.
Revamped FISMA requirements aim to improve federal security
by Crystal Bedell
An automated tool and mandates for continuous monitoring try to improve federal information security efforts.
- Get actionable results from a security information management system by Andreas M. Antonopoulos
IT consumerization drives new security thinking
by Marcia Savage
The influx of personal smartphones and other computing devices into the enterprise is forcing a shift in security strategy.
Data breaches show enterprise need for better data security management
by Robert Westervelt
Sony and other data breaches suggest need for data accountability, better configuration management.
- IT consumerization drives new security thinking by Marcia Savage
Lack of SMB security opens door to online criminals
by Michael S. Mimoso, Editorial Director
Online criminals have smaller targets firmly in their crosshairs.
Mobility trend takes off in the enterprise but leaves out security
by Chenxi Wang
Banks and other businesses are rushing to jump on the mobility trend but leaving security behind.
Marcus Ranum and Bob Blakley discuss risk management failures
by Marcus J. Ranum, Contributor
Security expert and Information Security magazine columnist Marcus Ranum continues a new bimonthly feature where he goes one-on-one with a fellow security industry insider.
- Lack of SMB security opens door to online criminals by Michael S. Mimoso, Editorial Director
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...