Seven Steps to Online Security

Seven Steps to Online Security

Seven Steps to Online Security

Monitor and report; maintain a response team to wield security tools andkeep other employees up to speed.
Cyber-security is an ongoing process, not just a set of tools or a single implementation and training event, says Christopher Burgher, an associate principal with SunGard Availability Services Consulting. In this slideshow, he offers some basic steps toward a holistic, adaptive approach to threats from the Internet. The basic lesson is that proper use of firewalls, anti-virus software and other technical tools is important, but equally vital is an understanding of the roles of respective departments and individuals in the security framework, and knowledge of the ways security fits into overall corporate workflow and strategy. Communication vertically and horizontally within the organization is of the utmost priority— before, during, and after any attack on your information systems. Even the rudiments of crime-fighting, such as an appreciation for the art and science of forensics, belong in your security plan. Remember: the bad guys are not standing still, so you don't have that luxury, either.
Senior Writer and author of the Know It All blog

Ed Cone has worked as a contributing editor at Wired, a staff writer at Forbes, a senior writer for Ziff Davis with Baseline and Interactive Week, and as a freelancer based in Paris and then North Carolina for a wide variety of magazines and papers including the International Herald Tribune, Texas Monthly, and Playboy. He writes an opinion column in his hometown paper, the Greensboro News & Record, and publishes the semi-popular EdCone.com weblog. He lives in North Carolina with his wife, Lisa, two kids, and a dog.
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.