Access "Stopping the Next Heist"
This article is part of the February 2006 issue of Best-of-breed: Security Products of the Year: 2006
Storage and backup systems are rife with vulnerabilities. Take seven steps to secure them, or risk unflattering headlines and legal problems. From the ChoicePoint fiasco to the CardSystems debacle, data security breaches make news all the time. Rarely does a week go by without a report of another incident of credit card accounts exposed, personal information stolen, or backup tapes disappearing. Universities, banks, government agencies and even security software companies all have been in the unfortunate spotlight after a breach. The Privacy Rights Clearinghouse tallied nearly 100 breaches between February and December last year. Not only have storage networks created another attack point, but storage networks, networked backup and recovery systems are some of the most direct routes to your information. Why hack a server when you can go around it to get to the data? Storage systems aren't just a target-- they're a big, juicy target for a heist. A big reason for the concern and why we're hearing about all these security problems is due to laws--such as SB ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Stopping the Next Heist
Storage and backup systems are rife with vulnerabilities. Take seven steps to secure them, or risk unflattering headlines and legal problems.
-
Secure Reads: Real Digital Forensics
Read a review of the security book Real Digital Forensics.
-
Portable device security: Safend's Safend Protector
Read a security product review of Safend's Safend Protector.
-
Recent Releases: Security product briefs, February 2006
Read about the security products released in February 2006.
-
Game Over?
Where do you turn when the security vendor you've banked on gets gobbled up?
-
Stopping the Next Heist
-
-
Products of the Year 2006
Antispyware; Antivirus; Authentication; E-mail Security; Identity & Access Management; Intrusion Detection; Intrusion Prevention; Network Firewall; Remote Access; Network Security Management; Vulnerability Management; Wireless; Emerging Technologies
-
Hot Pick: Stonesoft's StoneGate SG-4000
Stonesoft's StoneGate SG-4000
-
E-mail Security: Barracuda Spam Firewall
by Tom Bowers, Contributor
Barracuda Networks' Barracuda Spam Firewall
-
Intrusion Prevention: Lucid Security's ipAngel 4.0
Lucid Security's ipAngel 4.0
-
Products of the Year 2006
-
Columns
-
On The Radar: Avoiding security upgrade disaster
Upgrade Agony
-
Perspectives: Pwning the C-suite
Losing a few too many battles? Positive social engineering can help.
-
Ping: Yan Noblot
Yan Noblot
-
Editor's Desk: When customers become victims of acquisitions
Survival of the Fittest?
-
On The Radar: Avoiding security upgrade disaster
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO