Monitor and report; maintain a response team to wield security tools andkeep other employees up to speed.
Cyber-security is an ongoing process, not just a set of tools or a
single implementation and training event, says Christopher Burgher, an
associate principal with SunGard Availability Services Consulting. In this
slideshow, he offers some basic steps toward a holistic, adaptive approach
to threats from the Internet. The basic lesson is that proper use of
firewalls, anti-virus software and other technical tools is important, but
equally vital is an understanding of the roles of respective departments and
individuals in the security framework, and knowledge of the ways security
fits into overall corporate workflow and strategy. Communication vertically
and horizontally within the organization is of the utmost priority—
before, during, and after any attack on your information systems. Even the
rudiments of crime-fighting, such as an appreciation for the art and science
of forensics, belong in your security plan. Remember: the bad guys are not
standing still, so you don't have that luxury, either.
Ed Cone has worked as a contributing editor at Wired, a staff writer at Forbes, a senior writer for Ziff Davis with Baseline and Interactive Week, and as a freelancer based in Paris and then North Carolina for a wide variety of magazines and papers including the International Herald Tribune, Texas Monthly, and Playboy. He writes an opinion column in his hometown paper, the Greensboro News & Record, and publishes the semi-popular EdCone.com weblog. He lives in North Carolina with his wife, Lisa, two kids, and a dog.
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.