If youre concerned that your network might not be as secure as it should be, Paul Rubens at EnterpriseNetworkingPlanet.com offers tips on protecting your small business network.
If protecting your organization from cyberattack is your responsibility, you probably have heard of the 20 baseline security controls that the Consensus Audit Guidelines (CAG) project defines and recommends.
Speaking at the Gartner Information Security Summit 2009 in London, SANS instructor Stephen Armstrong outlined 15 "quick wins" based on these controls: simple steps you can take to make an immediate difference to your security.
Here are the 20 controls, and Armstrong's quick wins and other advice:
1. Inventory of Authorized and Unauthorized Devices
2. Inventory of Authorized and Unauthorized Software
Quick win: Deploy an automated asset inventory tool that both scans designated IP address ranges and analyzes traffic to identify devices and software. You can't secure your network unless you know exactly what hardware and software is running on your network.
3. Secure Configurations For Hardware and Software on Laptops, Workstations and Servers
Quick win: Remove games, hyperterminals and "crapware" that comes bundled with many end user machines, and unnecessary software on servers. If you need six applications on a machine, then there should be six, not twenty. Ideally, deploy standardized images, and document whenever a non-standardized image is used for any reason.
| Do you have a comment or question about this article or other small business topics in general? Speak out in the SmallBusinessComputing.com Forums. Join the discussion today! |
Your White Papers Search Results
-
Solid State Drives: The Future of Data Storage?
Solid state disks (SSDs) made a big splash in consumer technology, and now the technology is already making waves in the enterprise storage market....
Download now -
ESG Lab Validation Report: Deploy and Manage Storage with Ease using NetApp...
This Lab Validation Report from Enterprise Strategy Group presents the results of hands-on evaluation and testing of the FAS2240, NetApp...
Download now
-
Managing Multiple Operating Systems: 5 Best Practices
The world of IT has changed significantly in recent years. With so many options, today's organizations and users are moving away from a PC-only...
Download now -
The Quest for a Cloud Integration Strategy
Historically, enterprise-wide integration and its countless business benefits have only been available to large companies due to the high costs of...
Download now

