Top five... steps to consider for your security strategy

Key considerations for IT infrastructure security strategy

  • E-Mail
Top five... steps to consider for your security strategy Security strategies need to include a number of different facets.
By  Georgina Enzer Published  July 18, 2013

1. Detect and block at the perimeter and inside the network

It is good practice to handle threats as close to the perimeter as possible to prevent malware from entering the network and potentially infecting endpoint devices. It is wise to also look for malware and other attacks on protected network segments housing sensitive assets.

2. Assess and protect endpoints

A layered defence is your best strategy; endpoints are not always connected to a corporate network. Identify endpoint protection solutions that are lightweight and do not hinder device performance to ensure user experience is not impacted.

3. Analyse threats through context

Not all threats are created equal. Technologies that see and correlate extensive amounts of event data can use this context to pinpoint compromised devices based on behavioural characteristics.

4. Eradicate malware and prevent reinfection

To eliminate malware consider technologies that can track every file on every device so that you can identify ‘Patient Zero’, the malware trajectory and all instances in the enterprise.

5. Remediate attacks with retrospective security

Advanced malware protection should alert users about files that have been subsequently identified as malware for retrospective remediation.

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code