Is your data secure? Think again. Securing data is unlike any other corporate asset, and is likely the biggest challenge your company faces today. You may not see it, but almost all of your company's information is in digital form somewhere in the system. These assets are critical because they describe everything about you; your products, customers, strategies, finances, and your future. They might be in a database, protected by data-center security controls, but more often than not, these assets reside on desktops, laptops, home computers, and more importantly in email or on some form of mobile computing device. We have been counting on our firewall to provide protection, but it has been estimated that at least fifty percent of any given organization's information is in email, traveling through the insecure cyberspace of the Internet.
Digital Assets are Unique
Digital assets are unlike any other asset your company has. Their value exceeds just about any other asset your company owns. In their integral state they are worth everything to your company; however, with a few "tweaks" of the bits they are reduced to garbage. They fill volumes in your data center, yet can be stolen on a keychain or captured in the air. Unlike any other asset, they can be taken tonight, and you will still have them tomorrow. They are being created every day, yet they are almost impossible to dispose of, and you can erase them and they are still there. How can you be sure that your assets are really safe?
Understanding Physical Security Architectures
Physical assets have been secured for thousands of years, teaching us some important lessons. An effective security architecture uses three basic security control areas. Let's assume you want to create a secure home for your family; what would you do? Most of us started with the basics; doors, windows, locks, and perhaps a fence. Second, we rely on insurance, police protection, and we may have even purchased an attack dog or a personal firearm. Given these controls, you may have taken one more step to provide some type of alarm. Not trusting your ears to detect an intrusion, you might have installed door and window alarms, glass break sensors, or motion detection. You may have even joined the neighborhood watch program in your area. These are the controls everyone uses, and they are similar to the controls that have been used since the beginning of mankind.
Which is most important? Looking at the three categories of security controls used, the first consists of protective devices that keep people out; doors, windows, locks, and fences. Secondly, alarms notify us of a break-in. Finally we have a planned response control; the police, use of a firearm, or recovery through insurance. At first glance it may appear that the protective controls are the most important set of controls, but a closer look reveals that detection and response are actually more important. Consider your bank; every day the doors are open for business. This is true of just about every business, home, or transportation vehicle. Even the bank safe is generally open throughout the day. You can see it from the bank teller counter, but step over the line and you will find out how good their detection-response plan is.
Evaluating your Company's Approach
Now look at your digital assets; how are they protected? If you are like most organizations, your entire security strategy is built on protection controls. Almost every organization in America today has a firewall, but does not have the ability to detect and respond to unauthorized users. Here is a simple test; run a Spyware removal program on your system and see what comes up. In almost every case you will find software installed on your system that was not installed by an authorized user. In the past this has been an irritation; in the future, this will become the program that links uninvited guests to your data. Bruce Schneier, a well known security author and expert writes in his book, Secrets and Lies, "Most attacks and vulnerabilities are the result of bypassing prevention mechanisms". Threats are changing. The biggest threats likely to invade your systems will bypass traditional security measures. Phishing, spyware, remote access Trojans (RATS), and other malicious code attacks are not prevented by your firewall. Given this reality, a detection response strategy is essential.
It's time to review your security strategy. Start by asking three questions. First, which assets are critical to your business, where are they located, and who has access to them? Second, what threats exist? Determine who would want your data, how they might gain access, and where the possible weaknesses in your security architecture lie. Finally, how comfortable are you with your company's ability to detect and respond to unauthorized access. If someone wants access to your data, preventative measures alone won't stop them.
Begin planning a balanced security architecture. Start by adding detection controls to your prevention architecture. This does not mean simply adding intrusion prevention software (IPS), but rather creating a system to proactively monitor activity. Intruders make noise, just like in the physical world, and with proper event management, combined with zero-day defense technologies of IPS, network administrators can begin to understand what normal activity looks like and what anomalies might be signs of an attack. In a recent interview with Scott Paly, President and CEO of Global Data Guard, a Managed Services Security Provider (MSSP), Scott said, "Threats such as worms and new hacker techniques constantly morph, so the most viable model for optimum security is a blend of preventive and predictive controls based on analysis of network behavior over time". By balancing prevention, detection, and response, companies can defeat most of the latest hacker attempts.
David Stelzl, CISSP is the owner and founder of Stelzl Visionary Learning Concepts, Inc. providing keynotes, workshops, and professional coaching to technology resellers. David works with executive managers, sales people, and practice managers who are seeking to become market leaders in technology areas that include Information Security, Managed Services, Storage and Systems solutions, and Networking. Contact us at info@stelzl.us or visit http://www.stelzl.us to find out more.
![]() |
|
![]() |
|
![]() |
|
![]() |
First off I should explain what phishing is. Phishing is... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
Well, this is an article I never thought I would... Read More
If you run any type of Internet business, Adware and... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
Watching how the traditional media covers the latest virus or... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
They're out there. Individuals trying to make a quick buck... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
If you use emails actively in your communication, you must... Read More
Over £5 billion pounds was spent on online shopping in... Read More
Phishing is a relatively new form of online fraud that... Read More
When it comes to reporting Internet scams most of us... Read More
The Internet is a vast International Network of people and... Read More
There is nothing more important that password security in world... Read More
A couple of years back, I paid my dues the... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Despite the current wave of identity theft and corporate security... Read More
File sharing on p2p is soaring despite the music and... Read More
Ok, ok, I know you've seen them. All those pop... Read More
If you are a parent, as am I, I think... Read More
Can you protect your computer from all possible viruses and... Read More
Since its birth, the Internet has grown and expanded to... Read More
At this point, if you've got the whole "turning the... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
Computer infections can be broken up into 4 main categories... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
Spyware protection software is the easiest way of removing spyware... Read More
It has been said that with the wealth of information,... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
Shopping for horse gifts or other gift items on the... Read More
There are ways to insure security though. You can get... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
Identity Theft is one of the most serious problems facing... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
The Internet is a vast International Network of people and... Read More
As you know, this time the virus under the name... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
I am the victim of an internet scam. It is... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
Ebay is a great site and is used by many... Read More
Paypal is a great site and is used by many... Read More
Much has been said on the theory of password protection... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
Have been an Internet user for more than 9 years,... Read More
A few nights ago I received an email from "2CO"... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
If you use emails actively in your communication, you must... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
You are at your computer, checking out software on EBay.... Read More
This is the second in a series of articles highlighting... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
There has not been a time in the history of... Read More
Many of us have run into an annoying and time-consuming... Read More
Having a good Spyware eliminator on your computer is vital... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
This really chapped my lips...I recently bought a new computer.... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Internet Security |