Sunday 25 December 2011

Unique Content Article on lok-it.net,encrypted flash drive

Data Security Only Part of Total Security for a Company Manager


by Oliver David


Often times, information security and actual physical security are extremely separate and distinct problems. As such, every of these is much more most likely to be handled by various components of a business. Most frequently, information security is under the management with the CIO or perhaps the CFO, however the physical security of individuals and issues is left towards the facilities individuals who manage the cleaning and upkeep with the physical plant. Much more disparate is the fact that some businesses outsource this physical security to third party vendors.

An Information Assurance Engineer, Darren Wigfield recently said “There’s no point in having thorough lock down and hard passwords and encryption on your servers if people can just walk in and take people’s laptops.” He works with the Department of Defense to ensure that the department meets security requirements for both data and physical security.

Wigfield analyzes an organization’s security from a holistic approach. He looks at each the network and also the buildings to figure out how protected the business or organization is from either on-line or physical intrusion or theft. Other specialists have noted that the concentrate of be concerned and protection is on the web, but that most businesses miss the overall security picture - that a thief is just as most likely to come through a actual door or window to steal property and private info.

“All everyone worries about now is the Internet,” explained Shane MacDougall, partner at Tactical Intelligence, an information security firm that tests vulnerability and penetration. MacDougall said that in reality, that’s missing the biggest part of the security picture. “They’re just as likely to get your data through the back door.” The real back door, not the virtual one. He went on to note that he’d often encounter poor physical security that can be the catalyst for data security breaches. “When I’ve done penetration tests, I’ve found network jacks active in the lobby. Often they’re not set to a guest VLAN. Or there’s unprotected wireless,” he said.

The important to security would be to keep in mind that information security is at danger any time that an individual can acquire access to it, whether or not it's more than the web or via an unsecured door or window. Hacking is only 1 problem, but if somebody can plug into a company’s internal network whilst waiting in a reception region or conference space, then it is just as simple to steal the information. An encrypted flash drive is one method to secure data.




About the Author:





You are receiving this because you signed up for it on 2011-10-03 from IP 203.109.66.181


To fine-tune your selection of which articles to receive, just login here
using your username:


To unsubscribe please use the following link:

Unsubscribe



No comments:

Post a Comment