|
|
CMMS Software - Selecting the Right CMMS
Good Computerized Maintenance Management Software (CMMS)
that schedules preventive maintenance work orders on your
equipment is an integral component of any efficient
maintenance department. Preventive and scheduled
maintenance, efficiently...
College and University Professional Association in Human Resources selects gomembers’ extraweb
[Herndon, VA] gomembers, Inc., (http://www.gomembers.com) announced this week that the College and University Professional Association in HR (CUPA-HR: http://www.cupahr.org) has selected the extraweb online module to complement their pinnacle...
Event Planning Software: A Beginners Guide to Project Tracking
When using your event planning software, undoubtedly you reach
the point where you need to perform project tracking. Depending
on the size of the event, you will have one or more projects to
accomplish prior to the big event.
Your event...
Got Virus? Your data is NOT lost forever!
GOT VIRUS? Your Data is NOT lost forever! In the wake of so many computer viruses running wild, "Hope is not lost"! With the recent release of such viruses as: mydoom; netsky; mofei, lovegate and many more destructive viruses, there is an...
Success Stories - 12 Doers Share Their Secrets: Interview with Ben Prater
Ben, from Cape Girardeau, Missouri, is a 26 year old software development consultant. He says that his job is to help people turn their dreams into reality. After years of looking at the Internet from the outside, Ben decided to take the advice of...
|
|
|
|
|
|
|
|
Will your network pass a security audit?
It is a well-known fact that in the Internet-connected world network perimeter vulnerabilities do exist that allow unauthorized individuals access to networks and provide the ability to disrupt business continuance. Well-prepared companies do know about many of these vulnerabilities and they correct them whenever appropriate. However, there are a large number of new, as well as older vulnerabilities that the average company is just not aware of. If these vulnerabilities are known, companies usually, and I emphasize usually, allocate resources to them. Unfortunately, too many companies either do not have the resources to track such security-related matters or do not have the trained internal personnel to allocate towards identifying and remediating the vulnerabilities. Obviously knowing about or being able to detect the vulnerabilities is half the battle, but not acting on the known issues for any reason is almost a guarantee to lose the battle.
An alarming fact is that many companies do not prioritize information security because it does not generate revenue for the company. However, as we have seen in the headlines and trade journals, the lack of a proper security program can and does affect the bottom line. Some organizations are now investing larger budget dollars and resources into information security, and they’re starting by assessing their present level of risk with an audit. If your company relies on the Internet and was one of vast number that missed the vulnerability used by the Code Red virus, you know how the lack of an active security program can affect the bottom line. In addition to unknown vulnerabilities, there are many stories of technicians performing routine network maintenance and unintentionally leaving credit card database or other proprietary information open for would be hackers. Finding the vulnerabilities in your environment is vital to the success of your security program, but knowing how to prioritize and perform proper remediation is often impossible without properly trained personnel. Lets concentrate on the value of the audit process and deliverables for a moment.
Whenever we think of audits, the first thing that comes to mind is the financially related IRS visit. They are looking for holes in the integrity of income and expense reporting for individuals and companies. These audits are required because if the system, in this case the tax system, has enough vulnerabilities, then the whole system fails. The audit acts as the police to either deter the vulnerabilities or find them so they can be eventually removed. Removing vulnerabilities in your information network is just as key, but can you find them, which are important, and how do you remove them efficiently. Much like the IRS audits, finding information network security vulnerabilities requires a trained professional. Most commonly, the security professionals trained in auditing are full time in-house employees of only the largest companies. For the majority of companies who want thorough periodic
audits, this requires the use of outside security experts as the most cost-effective choice. Outsourcing to security professionals offers many advantages over in-house testing, such as having a team of experts dedicated to current security matters, armed with proven best practices or entire methodologies, and equipped with a suite of security auditing products instead of a single commercial tool.
Companies must also consider the value of the audits deliverables/results. Deliverables must not only detail all of the current vulnerabilities, but also prioritize what issues are important, document proven methodologies for remediating the vulnerabilities, and provide cost-effective methods to mitigate the risk. The majority of companies cannot afford to maintain the staff and application software necessary to conduct an audit at this level. Even those companies that do have such a significant security budget often use an outsourced firm to validate their own efforts.
Some additional benefits of a professional outsourced audit are: recording an objective baseline and changes on a periodic basis, having a trusted security partner to turn to as issues arise, and the ability to meet industry requirements for objective third-party auditing. For those companies outsourcing audits as a secondary check, it also assists in justifying security budgets, by validating the current security-related expenditures.
Although it was mentioned that companies are sometimes challenged with prioritizing security matters, based on our own experience there is a trend with technology executives, to place a higher priority on network security. The newfound emphasis applies to both internal and external audits and really comes into play with those companies that have a great reliance on the Internet and business continuance.
Finding all of your vulnerabilities is increasingly difficult without a full suite of auditing tools, but remember, finding the vulnerabilities is only half the battle. In order for audit deliverables to be truly effective they have to include professional feedback on what issues are important, remediation efforts detailed and prioritized, as well as describe how all of the effort and expense will affect the level of risk.
If you feel your systems environment could pass a security audit, but haven ’t had one, our experience shows you might be surprised by a failing grade. If you have had an audit and the vulnerabilities were exposed, hopefully you have an action plan you are utilizing to eliminate the vulnerabilities. Once the action plans are complete, you might consider outsourcing your next audit to validate your efforts.
About the Author
Michael Bruck is the founding partner of Bruck and Associates, Inc. an 8 year old Information Security consulting firm. Mr. Bruck leads his security team with a successful 16-year background in IT management and senior engineering positions. He can be reached through the website at http://www.bruck-inc.com or by email: info@bruck-inc.com.
|
|
|
|
|
Tucows Downloads - Download Freeware and Shareware Software |
Download freeware, shareware, and demos. Maintains over 45000 software titles that are tested, rated, reviewed and ready to download. |
www.tucows.com |
  |
Free Software Downloads and Software Reviews - Download.com |
Download shareware, freeware and Demo software for PC, Mac, Linux, and Handhelds categorized into categories, plus software reviews. |
www.download.com |
  |
Computer software - Wikipedia, the free encyclopedia |
This includes application software such as a word processor, which enables a ... Application software is often purchased separately from computer hardware. ... |
en.wikipedia.org |
  |
Shareware.com - Search for shareware programs and free software ... |
Search for shareware programs from more than a dozen downloadable software directories. |
www.shareware.com |
  |
Jumbo: Free & Shareware MP3 files, Games, Screen Savers & Computer ... |
Source of free and shareware computer programs and utilities for PC and Mac. Evaluate software and read product reviews. Download games and screen savers. |
www.jumbo.com |
  |
Computer Software in the Yahoo! Directory |
Browse categories featuring sites devoted to computer software, including shareware and freeware download sites, operating systems, desktop customization, ... |
dir.yahoo.com |
  |
IEEE Software |
IEEE Computer Society's magazine covering all aspects of software, including software engineering. |
www.computer.org |
  |
Free Downloads on ZDNet | Shareware, Trialware, Evaluation Software |
ZDNet's Software Directory is the Web's largest library of software downloads. Covering software for Windows, Mac, and Mobile systems, ZDNet's Software ... |
downloads.zdnet.com |
  |
FSF - The Free Software Foundation |
Free software is a matter of liberty not price. Think of "free" as in "free speech". |
www.fsf.org |
  |
Apple - Software |
Software products for your digital life. ... The perfect addition for professional review. QuickTime Broadcaster. Encoding software for live events. ... |
www.apple.com |
  |
Open Directory - Computers: Software |
In Partnership with AOL Search. about dmoz | report abuse/spam | help. the entire directory, only in Computers/Software. Top: Computers: Software (38471) ... |
dmoz.org |
  |
freshmeat.net: Welcome to freshmeat.net |
About: The Web browser is probably the most frequently used software today, ... Web professionals can use the software for functional testing and regression ... |
freshmeat.net |
  |
Software - GNU Project - Free Software Foundation (FSF) |
Listing of the GNU software packages. |
www.gnu.org |
  |
Sun Software |
Get enterprise-class software--Solaris 10 OS, the Java Enterprise System, ... Sun Java StorageTek Software reduces cost and complexity with a single, ... |
www.sun.com |
  |
Internet Real Estate.com -- owns and operates a portfolio of the ... |
SOFTWARE.COM · SWEEPSTAKES.COM · PHONE.COM PODCAST.COM ... Software.com | Sweepstakes.com | Phone.com | Podcast.com | Shop.com | Safety.com ... |
www.internetrealestate.com |
  |
Joel on Software |
A weblog by Joel Spolsky, a programmer working in New York City, about software and software companies. |
www.joelonsoftware.com |
  |
Amazon.com Software: Computer & video games, business, accounting ... |
Online shopping for computer & video games, business & office productivity software, software from Microsoft, Apple, Adobe & more; accounting, antivirus, ... |
www.amazon.com |
  |
IBM Software - Home Page |
IBM home page for all of its software products, including Lotus and Tivoli, with keyword search, category browse and AZ product names. |
www.ibm.com |
  |
Opera web browser: Homepage |
Copyright © 2006 Opera Software ASA. All rights reserved. Skip navigation. Opera Software ... Copyright Opera Software ASA . All rights reserved. ... |
www.opera.com |
  |
Google Directory - Computers > Software |
Search only in Software Search the Web ... Software Categorized by Letter: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ... |
www.google.com |
  |
|