|By Ian Khan||
|July 29, 2015 02:15 PM EDT||
Unlike Ashley Madison, How to Avoid Baring It All
Today's case of Ashley Madison getting hacked and literally being kept at ransom is a classic case of something not very new, but something we need to take a look at with a fresh set of eyes. It's not all the trouble all their customers will get into that I'm talking about, but the mere corporate nightmare of having your entire customer data leaked. Today it's one organization, who know is who is next tomorrow. Want to know how to avoid getting caught with your pants down? Read on.
Enterprise Infrastructure security is on the top priority list of every CIO. If you are an IT decision maker and security is not on your hot list, it's time to dust off that resume. Sorry folks but that's the reality. As an enterprise that owes a commitment to its end users, philanderers or not, from an IT perspective all organizations are the same. We are not going to get into a discussion about morality but we are going to touch on three major points to consider and lock down if you don't want to be caught with your security pants down.
1. You Can be Hacked Anytime
This is the golden nugget of information that stays true to every word. If you are an enterprise, a government, a small or a large business, on the cloud or on premise, please note that you can be hacked. Hacks also come without warnings, so don't expect any warning signs. Before you even realize that an outsider is tasting your grapes, it may be too late. If you live by this rule and yes you can get some t shirts made for your team to just drive down the message, you will be far ahead of the curve. No enterprise is safe.
2. How Important Is Your Data
Categorizing your information, data or whatever have you, is a good practice. Sometimes not every type of data needs to be protected, akin to your large collection of vintage cars (some of them are less precious than the others). Based on the amount and type of data, you may need to look at different levels of security and mechanisms (such as private cloud, hybrid or Public Cloud). As an example if you are working with a cloud storage company, you may want to double check on their fine print to see what kind of cloud they offer before you upload all your customer credit card information.
3. Obsesses about Intrusion Checks
Having security mechanisms, firewalls and multiple layers of SSL enabled is great. Not so great if a vulnerability has led to a hack. In my opinion there is no excess when it comes to checking your infrastructure for security leaks, and vulnerabilities and really doing everything you can to obsess about it.
Follow these three Best Practices for Data Protection to be on the safer side. IT is the profession of the Noble. We never get appreciated for all the bad things we stop from happening and yes keeping things running smooth is an art not just a skill.
Surely, with this advice you will definitely not be the knight in shining armor when the bad guys come knocking on your network because not everyone may get to know it, but unlike Ashley Madison, for sure you won't be caught with your pants down (IT Pants...that is).
- The Top 250 Players in the Cloud Computing Ecosystem
- Cloud People: A Who's Who of Cloud Computing
- Ulitzer Names the World's 30 Most Influential Cloud Computing Bloggers
- 4th International Cloud Expo: Photo Album
- Cloud Expo New York to Attract More Than 8,000 Delegates
- The Cloud Computing Kettle Heats Right Up
- Industry Experts Discuss the State of Cloud Computing
- 4th International Cloud Computing Conference & Expo Starts Today
- Cloud Expo and The End of Tech Recession
- SYS-CON.TV: Cloud Computing Expo Power Panel