Monday, May 9, 2011

Top Reasons for IT Security Breaches_2847

Top Reasons for IT Security Breaches Top Reasons for IT Security Breaches

It is almost impossible to find the top ten reasons why security breaches occur on your network. This article contains not only the top ten but a few more critical areas to look at when securing your network. Here is a link to reported breaches of companies across the U.S.

When a security breach occurs, there is generally a simple reason why this has taken place. Information Technology Professionals should be trained on all aspects of security and should be certified in information technology security. Allowing untrained IT personnel to work with your network can cause your network to fail or allow malicious users to breach the network.

When new computers are deployed, connecting a computer to the internet before it is hardened with updates Dell latitude d830 Battery, patches, user configuration and its firewall can create an opening on your network. Because default installations of any operating system have vulnerabilities Dell Vostro 1510 Battery, hackers can exploit these computers or devices in minutes.

Every IT team should be trained and made aware of security exploits that are on the web. The IT team should communicate anytime Microsoft or related vendors issue warnings and updates. Being unaware of potential security problems can lead to a breach of your network.

Disaster Backup and Recovery plans need to be put in place and should be tested on a regular basis. How does this fall in the top ten? There have been many cases over the past year where IT personnel have misplaced, discarded or lost tape backups of critical data. Tapes should be stored securely both on and offsite.

One of the biggest to leave holes in your network is by deploying devices such as wireless access points that still have default username and passwords in place. When deploying any device hp pavilion dv5 Battery, the default username and passwords should be changed to protect access to the device. Wireless should be hardened by using a Radius server and WPA Enterprise security. Leaving the default passwords on firewalls or other devices can leave a critical opening on your network.

No comments:

Post a Comment