The 7 Habits of Highly Effective Security
June 6, 2000
With cybercrime on the rise, it is important for organizations to make
sure that protecting their vital information and assets, and their customers,
is not getting overlooked. Sometimes it is the most basic security procedures
that are overlooked, e.g,. the utilization of safe, encrypted passwords.
If every minute of downtime costs $10,000 , how can your organization
afford to overlook security? If the average web buyer will wait only 8
seconds for a page to download , allowing your site to become vulnerable
to denial of service attacks may wreak havoc on your bottom line. In order
to prevent your customer credit card numbers from being stolen, we have
provided 7 key habits that should become a part of your IT security agenda.
1. CEO/CIO Wallet Card
The Standish Group  Zona Research
what you need to protect and from whom. If you don't have the internal
resources to perform a security analysis, hire an outside consultancy
to do one for you.
for vulnerabilities and weaknesses. There are numerous network scanners
such as Cybercop and Internet Security Scanner that can save you
quite a bit of time with this.
corrective action to insecure systems and policies. After you find
out where your vulnerabilities are, you now know where you need to
take action. If your staff is unable to resolve these vulnerabilities,
outsource the job to someone who can.
security policies and processes. Implement. After you ascertain what
needs to be secured, and how, create corporate policies to support
sure that Security Management is part of the IT budget. Purchasing
security enforcement products and allocating funds for implementation
should not be overlooked.
security enforcement (firewalls, anti-virus, intrusion detection).
Purchasing security products is not enough. You need to deploy, manage,
and support them.
your staff on security policies and processes. Without educating your
staff on the importance of security, your CIO won't receive the buy-in
needed from the other executive managers to make security deployment
Taylor, former Director of Research for Security at TEC is now the Chief
Technology Officer at Relevant Technologies, Inc.
more information go to www.relevanttechnologies.com.
This article has been modified from its original form since the original