Six Real Security Threats IT Professionals May Face in 2013

Six Real Security Threats IT Professionals May Face in 2013

ID: 254892

SolarWinds Offers All IT Pros Best Practices for Managing Security Operations


(firmenpresse) - AUSTIN, TX -- (Marketwired) -- 05/01/13 -- IT Security can overwhelm even the most seasoned security expert when headline-grabbing threats like Spamhaus DDoS are brought to the forefront by media. SolarWinds (NYSE: SWI), a leading provider of powerful and affordable , today outlined six security threats that many IT professionals never think they'll face (until they do) and provided best practices to help prevent and manage unwanted threats from becoming a reality.

While security experts may know better, many IT pros might think: "My organization is not a high-value target. What do we have that anyone would want?" In reality, the answer is more than they would guess. Sensitive and personal information like credit card and social security numbers, patient records, to name a few. Plus, with direct access to the breached network, they could do damage to other organization's networks.

Aside from organizations placing a great deal of trust in their employees and believing that their policies are adequate, what might take IT pros by surprise is simple employee ignorance. Due to the proliferation of personal mobile devices, employees are taking their work home with them more often. This has made it extremely difficult to keep track of who and what is connecting to the network, resulting in less control and increased security risks.

DoS and DDoS attacks are among the inventive hacking practices on the rise that could bring down business critical services, inhibiting user access and business continuity. IT pros may get caught off guard with this type of attack since, in many cases, it's the result of someone out to wreak some havoc.

As organizations grow and bandwidth for time and resources are taxed, it's easy for over-extended IT pros to overlook existing rules and inadvertently open security holes simply by not knowing the full impact of their changes, or for under-experienced IT pros to not know what to monitor and what tools to use.





Culprits masquerading as a trustworthy entity attempt to acquire usernames, passwords, credit card details, and account information to gain access to a system through email or via instant messaging. Organizations which are most affected believe that their controls are good enough, relying on junk mail as a catch-all or their users to know when and when not to open suspicious email.

For many, if not most, organizations, third-party applications like Java and Flash are critical infrastructures required to use a large number of business applications. Organizations are prime targets for infestations when IT pros assume that the most recent application version is security-proof, they are not up-to-date on their patches, or when they don't have full account of all the applications installed by end users.



It's easy to get caught up in preventing what-if scenarios, but it's most important to remember Security 101 -- the basics of what every IT pro should consider when securing their network, including:

Define and establish security policies and rules.

Document your network, policies and access.

Continuously track and monitor activity and behavior with real-time alerts and reporting.

Automate with software tools where you can.

Have an incident response plan including when to notify corporate legal, PR and customers/clients.

Regroup after an incident to ensure appropriate actions have been taken to mitigate risk in the future.

Use operational management tools to gain insight into suspicious behavior.

"In the pursuit of defending against the latest and most sophisticated attacks, we find many IT professionals doing so at the expense of fundamental security controls. IT security is not always about over-complicated issues or threats, but doing the basic steps to ensure you have a secure foundation in place," said Javvad Malik, senior analyst, 451 Research.



For IT pros that don't spend their day thinking about security yet need the tools to tackle everyday operational security challenges, SolarWinds offers IT pros a number of powerful, easy-to-use and affordable products with security functionality built-in. From (SIEM) to firewall and patch management and more, IT pros can assess their environment and deploy SolarWinds' IT management products on a need-by-need basis to achieve end-to-end security visibility.

- SIEM; endpoint data loss monitoring

- Firewall security management

- Endpoint vulnerability management

- User and device tracking

SolarWinds (NYSE: SWI) provides powerful and affordable IT management software to customers worldwide from Fortune 500 enterprises to small businesses. In all of our market areas, our approach is consistent. We focus exclusively on IT Pros and strive to eliminate the complexity that they have been forced to accept from traditional enterprise software vendors. SolarWinds delivers on this commitment with unexpected simplicity through products that are easy to find, buy, use and maintain while providing the power to address any IT management problem on any scale. Our solutions are rooted in our deep connection to our user base, which interacts in our online community, , to solve problems, share technology and best practices, and directly participate in our product development process. Learn more today at .

SolarWinds, SolarWinds.com and thwack are registered trademarks of SolarWinds. All other company and product names mentioned are used only for identification purposes and may be trademarks or registered trademarks of their respective companies.





MEDIA CONTACTS:
Grace Pai-Leonard
Text100
212.871.5194


Jodi Bart
SolarWinds
512.657.8297

Weitere Infos zu dieser Pressemeldung:

Themen in dieser Pressemitteilung:


Unternehmensinformation / Kurzprofil:
drucken  als PDF  an Freund senden  Networking Industry Leaders to Showcase Shortest Path Bridging Interoperability at Interop 2013 Virtual Instruments' Customer Base Continues to Grow as Demand Rises for Infrastructure Performance Management Solutions
Bereitgestellt von Benutzer: Marketwired
Datum: 01.05.2013 - 11:30 Uhr
Sprache: Deutsch
News-ID 254892
Anzahl Zeichen: 3373

contact information:
Town:

AUSTIN, TX



Kategorie:

Networking



Diese Pressemitteilung wurde bisher 162 mal aufgerufen.


Die Pressemitteilung mit dem Titel:
"Six Real Security Threats IT Professionals May Face in 2013"
steht unter der journalistisch-redaktionellen Verantwortung von

SolarWinds (Nachricht senden)

Beachten Sie bitte die weiteren Informationen zum Haftungsauschluß (gemäß TMG - TeleMedianGesetz) und dem Datenschutz (gemäß der DSGVO).


Alle Meldungen von SolarWinds



 

Werbung



Facebook

Sponsoren

foodir.org The food directory für Deutschland
Informationen für Feinsnacker finden Sie hier.

Firmenverzeichniss

Firmen die firmenpresse für ihre Pressearbeit erfolgreich nutzen
1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z