Image credit: Kristy Hom | Licensed under: CC BY 2.0

Protecting your IT environment today is extremely complex and can be a very scary task. You’re haunted by increased security threats, malicious attacks, BYOD, the Internet of Things (IoT) and new network-connected devices that you don’t even know about.

Endless Devices 

Consider the number of operating systems you are now slated to secure, the number of BYO devices that are a normal part of your organization’s operation in the form of smartphones, tablets and even network connected devices such as printers, scanners and kiosks. The freedom offered by mobile devices and the BYOD trend opens your organization to a myriad of security risks. Your users want mobility and the flexibility it provides, but you have to balance it against your organization’s need for security and control. Meanwhile, security threats continue to grow in both number and sophistication. If you’re the person in charge of ensuring your IT network and systems are buttoned up from malicious intruders and a growing world of creatively uncovered and exploited vulnerabilities, your job could literally be on the line with a single network security breach.

Internet of Things

It’s also clear that the IoT is here to stay and will grow exponentially as more smart devices enter both our personal and business lives. New systems and applications are easier than ever to set up and maintain, which often results in users setting these up on their own – leaving you with applications and systems you can’t protect. Unfortunately, many users are unaccustomed to thinking about issues like security and backups, or they are simply willing to sacrifice security for expediency.

Despite these security threats, protecting your IT environment doesn’t have to be a scary undertaking if you follow these readily available security safeguards:

  • Discovery and inventory – Ensure that you are have an accurate inventory of all connected devices.
  • Patching – Make sure that you are patching your operating systems and applications regularly. This can be the starting point for eliminating vulnerabilities using the latest versions of software available.
  • Antivirus software – Once considered the only line of defense, it’s imperative that this is in place, current and enforced on all of your managed endpoint systems.
  • Firewalls – No longer just for larger organizations, next gen firewalls offer new technologies for providing added protection and peace of mind, and they can be both affordable and easy to manage.
  • Proactive threat detection – Scans such as OVAL and SCAP can put you ahead of the curve in finding and remediating security holes in your IT endpoints.
  • Data encryption – Security from the data level to the cloud is today’s mantra, so make sure you start with endpoint data encryption for a solid defense for lost or stolen devices.

In addition to the steps outlined here, we invite you to watch an on-demand webcast, Protecting Your Network and Endpoints with the SANS 20 Critical Security Controls, addressing the challenges of protecting your IT environment. In this webcast, presented by internationally recognized security expert Robert Franklin Smith, you’ll be introduced to a practical and straightforward framework that provides 20 actionable security controls with specific recommendations on how to implement them at a technical level.  The webcast will briefly introduce you to the entire list, but will focus on seven controls that relate specifically to endpoint security.

Watch the Security Webcast

Related Content