2011: Security Resolutions

Posted: January 6, 2011 in Industry Commentary
Tags: , , , ,

2011 Security ResolutionsIt’s Jan, 2011 – the start of a new year – the time when people kick their old habits and form new and improved ones.  On a personal level, many decide to join a gym, get more organized or even travel more.  These ambitions are the same in the IT world – this is the time when professionals are looking for ways to step up their security initiatives, improve manageability and ensure business and operational goals are being met.  Over the past few days, many bloggers and industry professionals have shared their IT and security resolutions, and VPN Haus has captured these snapshots from around the blogosphere.  Cheers to a secure new year!

Eric Geier of eSecurity Planet

Secure Your Mobile Phone and Devicesyour new smartphone or mobile device might give you access to thousands of apps and help you be more productive, but it can also be dangerous if it gets into someone else’s hands. If it’s setup with your email account, Wi-Fi network, or if you use it to store any important data, you need make sure it’s secure. Being small and mobile makes it easy to lose or become stolen. You (or your employer) probably don’t want some Joe reading and sending emails on your account, connecting to your Wi-Fi and accessing the network, or reading sensitive documents or data.

Simon Heron, Internet Security Analyst for Redscan Ltd

One of the most significant external threats of 2011 will be hackers continuing to take advantage of websites with poor programming, allowing the attackers to manipulate the code, infecting the systems of site visitors worldwide.

Companies will need to ensure that their websites are written with security in mind and plan to revisit the sites regularly to ensure that they are regularly updated. Surfers will need to take extra care ensuring they update their systems promptly to avoid their systems being vulnerable to older exploits.

George Hulme of InformationWeek

Encryption – if you lose your notebook, or it’s stolen – and it’s not encrypted you are in significant trouble. Assuming – and this is a big assumption – that there are no critical work files on your drive – you are still at significant risk to identity theft, having your bank and brokerage accounts cleared, credit cards maxed, and an unlimited amount of other bad potentialities. If the full volume isn’t encrypted any snoop has access to every website you’ve visited, username and password you used, as well as every document you stored and application you use. That’s enough information to become you in about 5 minutes.  Many major operating systems today come equipped with full disk encryption utilities.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s