Seven Steps to Online Security
Cyber-security is an ongoing process, not just a set of tools or a single implementation and training event, says Christopher Burgher, an associate principal with SunGard Availability Services Consulting. In this slideshow, he offers some basic steps toward a holistic, adaptive approach to threats from the Internet. The basic lesson is that proper use of firewalls, anti-virus software and other technical tools is important, but equally vital is an understanding of the roles of respective departments and individuals in the security framework, and knowledge of the ways security fits into overall corporate workflow and strategy. Communication vertically and horizontally within the organization is of the utmost priority before, during, and after any attack on your information systems. Even the rudiments of crime-fighting, such as an appreciation for the art and science of forensics, belong in your security plan. Remember: the bad guys are not standing still, so you don't have that luxury, either.
SQL is a programming language that's high in demand, thanks to its ...