|
Register for our Free Newsletters |
|
 |
|
|
|
|
|
|
|
|
Other Carouselweb publications |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Tenable Comments On The Need For Vulnerability Visibility In Order To Be Secure
|
Tenable Network Security
: 27 January, 2011 (Technical Article) |
|
After a warning from CESG on Government vulnerability to data breaches, Tenable Network Security comments on organisational security risks originating from the network |
|
Following yesterday’s warning by the CESG, part of the government’s GCHQ intelligence agency, that the government risks security breaches through patchy audits, Marcus Ranum, Chief Security Officer of Tenable Network Security comments on the security risk that organisations face:
“Basic compliance standards can help protect organisations from data security incidents and are the key drivers in IT security. Yet despite this, many organisations including local and national Government, don’t actually have visibility of the threats facing their network so they are unable to make an accurate assessment of the key implementations that will lead to both compliant systems and ultimately enhance network security. For smaller local Government bodies with just a handful of computers, compliance may be as simple as turning on Windows Update for operating system patches, turning on daily automatic updates for antivirus software and spot-checking systems on a monthly basis to ensure that updates are applied. But for larger organisations such as government agencies and hospitals, managing hundreds or thousands of computers (as well as their entire network infrastructures) generally requires full-time IT staff. While monitoring each and every node on the network is a daunting task, as the data breach headlines continue to flow and security requirements continue to grow, now is the time for IT departments to take a proactive view of regulation and realise that compliance may not be as complicated, costly or time consuming as they fear. The vital aspects for ensuring that IT security is maintained still comes down to knowing where data is stored, encrypting sensitive data , and using effective security monitoring solutions that allow network managers to monitor logs and alert security staff when a computer or device has fallen out of compliance with security standards. If organisations do not use this level of protection, they are likely to be vulnerable to data theft” |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|