Our Hitlist series of blog posts will provide a quick reference for considerations when implementing a new technology or initiative within your organization. These will be topics we are asked about on a regular basis and for which we typically give the same answers across the board. Our organizational audit covers 10 domains of information security, only 4 of which are technology related. This series will be address many of these domains and how organizations can improve their score.
International travel is common in today’s business world. Many times businesses assume that their standard policies can apply to any international destination. We recently had a client contact us about traveling to their international office in a country that is typically known for lacking respect for other’s privacy. They asked us, considering this client would […]
“Bring Your Own Device” or BYOD is becoming an ever increasing topic among CIOs and other executives. We are not here to argue the merits of BYOD, but we do want to mention a few key topics to think about if you consider implementing it. 1. Policy The first thing an organization should have before implementing […]
Part 1 of our “Perimeter Network Security” Hitlist covered the virtual considerations one must consider when securing their network. Now, we will cover the things one should consider when securing the physical side of their network. Physical Considerations: Even though the virtual perimeter is the most obvious and most likely to be attacked, the physical […]
To “completely” secure an enterprise network is a very complex, and often, nearly impossible task. There are several different factors that come into play that must be considered and weighed: business requirements, stakeholders, network configuration, compliance requirements, etc. We have told a number of our clients that, in most situations, if someone really wants to […]
Many organizations are faced with the decision to implement or to forgo corporate WiFi. There are a number of considers to think about when contemplating this and many are business and security related and not merely technical in nature. Here are some things to consider: 1. Is it necessary? The first question to ask yourself […]