Image credit: Kristy Hom | Licensed under: CC BY 2.0
Protecting your IT environment today is extremely complex and can be a very scary task. You’re haunted by increased security threats, malicious attacks, BYOD, the Internet of Things (IoT) and new network-connected devices that you don’t even know about.
Consider the number of operating systems you are now slated to secure, the number of BYO devices that are a normal part of your organization’s operation in the form of smartphones, tablets and even network connected devices such as printers, scanners and kiosks. The freedom offered by mobile devices and the BYOD trend opens your organization to a myriad of security risks. Your users want mobility and the flexibility it provides, but you have to balance it against your organization’s need for security and control. Meanwhile, security threats continue to grow in both number and sophistication. If you’re the person in charge of ensuring your IT network and systems are buttoned up from malicious intruders and a growing world of creatively uncovered and exploited vulnerabilities, your job could literally be on the line with a single network security breach.
Internet of Things
It’s also clear that the IoT is here to stay and will grow exponentially as more smart devices enter both our personal and business lives. New systems and applications are easier than ever to set up and maintain, which often results in users setting these up on their own – leaving you with applications and systems you can’t protect. Unfortunately, many users are unaccustomed to thinking about issues like security and backups, or they are simply willing to sacrifice security for expediency.
Despite these security threats, protecting your IT environment doesn’t have to be a scary undertaking if you follow these readily available security safeguards:
In addition to the steps outlined here, we invite you to watch an on-demand webcast, Protecting Your Network and Endpoints with the SANS 20 Critical Security Controls, addressing the challenges of protecting your IT environment. In this webcast, presented by internationally recognized security expert Robert Franklin Smith, you’ll be introduced to a practical and straightforward framework that provides 20 actionable security controls with specific recommendations on how to implement them at a technical level. The webcast will briefly introduce you to the entire list, but will focus on seven controls that relate specifically to endpoint security.
Watch the Security Webcast