Access "10 tips to improve your network security strategy in a recession"
This article is part of the February 2009 issue of Improving your network security strategy in a recession
Times are tough for the good guys, but a recession is always an opportunity for criminals. Threats to your sensitive data, your customers and your infrastructure are increasing dramatically, from compromised and malicious websites, to unhappy employees, to poorly controlled partners. The good news is that you can tighten your security and tighten your belt at the same time. Quick-payoff strategies can help you stay on top of evolving security threats without neglecting your network infrastructure. There are many clever ways to do this. We'll look at 10 steps you can take to improve your threat management posture that require minimum costs, manpower and give you a fast return on your investment. 1. Secure powered-down switches. For a small effort, you can lock down unused network ports and at the same time save money by reducing your overall power consumption with switches (from Adtran and D-Link, for example) that turn off or power down when they're not needed. Your investment in this new equipment will pay for itself in a year or less. Auto shut-off is a ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
10 tips to improve your network security strategy in a recession
Here are 10 steps you can take to improve your threat management posture that require minimum investment, manpower and give you a fast return on your investment.
-
Recession forces security to measure and prioritize risks
Compliance demands, hacker threats, insider risks and integration concerns brought on by mergers and acquisitions make information security somewhat recession proof.
-
Encryption, DLP, disaster recovery top 2009 priorities
Information Security magazine's annual Priorities 2009 survey identifies data protection and disaster recovery among the top priorities for security managers.
-
Product Review: IronKey Enterprise Secure Flash Drive
by Ed Tittel, Contributor
IronKey Enterprise Secure Flash Drives enable organizations to control access to sensitive information on portable flash drives.
-
10 tips to improve your network security strategy in a recession
-
-
Product Review: PGP Endpoint
PGP Endpoint provides automated whole disk encryption that is centrally managed.
-
Product Review: Rohati TNS 100
Rohati's Transaction Network System brings NAC to the application level, and delivers granular access control for Web-based applications and file shares.
-
Product Review: Astaro Mail Gateway 4000
Astaro Mail Gateway 4000 is an antivirus and antispam appliance that is suitable for a midmarket organizations because of its simple central management capabilities.
-
Product Review: PGP Endpoint
-
Columns
-
Vein-reader biometric authentication for health care, financials
Health care facilities, along with financial institutions, are prime market targets for vein-reading technology, the latest in biometric applications.
-
Shoestring security budgets mean innovation and prioritization
Security managers face a lean economic year in 2009, but that doesn't mean threats and compliance demands will abate.
-
Proactive state privacy laws change security focus to prevention
New data breach notification acts in Nevada and Massachusetts are changing the way that organizations handle data.
-
Schneier, Ranum debate social networking risks
Should companies be concerned about employees' social networking? Bruce Schenier and Marcus Ranum take opposite sides on this issue.
-
Vein-reader biometric authentication for health care, financials
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...