Posts Tagged IT
A fundamental part of any effective IT security policy is the control you have over the network.
Where this becomes challenging is the introduction of the human element; both internally from staff who might not always know best and externally from people who do not always have the best interests of the firm at heart. The more control you have, the better positioned you are to protect the network from problems.
If you are at the head of an organisation’s IT team, then the ultimate responsibility for looking after its digital information is in your hands; this is a real burden especially in modern society, with computers being so powerful and harbouring such a lot of data.
The starting point of any high-control IT security policy is to make everything clear. This begins with your own mind, so make sure that you understand and can explain which processes are allowed in the workplace. With this is in mind you can begin communicating the policy to staff, who will probably have differing levels of IT knowledge.
If you can, it can really help to work alongside one or two of the employees who will be using the system, since they can give you invaluable information about how a staff member might react to certain advice and whether guidelines may cause problems in terms of their day-to-day operations.
A major part of your control will come from knowing who is using what and how they are utilising it. With the help of inventory software, you can list all the devices connected to your network, as well as certain software details. These specifications should aid you in identifying problems; for example, linking a certain device or operating system with an issue.
Awareness of the technology you are dealing with can also have a significant impact on how you would go about solving something that has gone wrong – without knowing what is in use you are giving yourself a handicap in some senses.
Being proactive rather than reactive is important in any job and it is no different in the world of IT. By keeping up to date with industry news and expert commentary, you should be able to foresee a number of troublesome issues, for instance, viruses or technical problems associated with certain devices.
However, your research does not stop there; you can also help yourself by trying to be present in company meetings when processes are being altered, as you may see an obstacle on the horizon – giving you plenty of time to produce a solution.
About The Author:-
John Stephen is a consultant. He is also an IT Support Technician, Internet Marketer and he loves to research with access software. He recommends http://www.kaseya.co.uk/ which provides the resources on strategic business goals while maintaining the availability, security and stability of your IT environment.
The eCommerce giant Amazon Inc is recruiting talented people. Amazon is getting lot of press on their new projects like Streaming Video, Amazon Lockers, Amazon Fresh. They are looking for Software Developers, Technical Program Managers, and Software Development Managers. Anyone who is interested in applying should fill out Amazon’s form and email it, along with their resume to email@example.com.
The HackingTag Security is going to release the Tag Mail, their own mail service on 16th June 2012. To get a @tagmail.cu.cc click on sign up.
NEW DELHI: Computer Emergency Response Team (CERT-IN), the country’s premier agency dealing with cyber security contingencies, said that its website was neither attacked nor brought down on Saturday. Hackers allegedly belonging to the group called Anonymous had earlier claimed they had attacked CERT-IN website with Distributed Denial of Service (DDoS) attack.
A spokesperson from ministry of communications & IT told TOI, “The claim that CERT-IN website was attacked and brought down by hackers is without any basis and at complete variance with the facts. The fact is that the website has been running continuously & uninterruptedly — including the whole of today.”
Incidentally, TOI could not access CERT-IN website on Saturday morning for a few hours. A check with http://www.downforeveryoneorjustme.com, a tool that can tell a web user if a website is down or not, revealed that CERT-IN was inaccessible.
The government acknowledged that hackers have been carrying out DDoS attacks on certain websites. “These attacks have been monitored and mitigated in a timely manner. Due to the massive attacks carried out by the hacker groups, it is possible that the sites may have been slightly slow in responding, depending upon the connectivity from where the sites were accessed, giving the impression that the site has been brought down,” said the spokesperson. He added that CERT-IN is analyzing logs of the attacked websites to identify hackers. “The attacks were multi-pronged. Therefore analyzing the logs and identifying the attackers will take reasonable time. As for action against them, all possibilities are on the table and law will take its own course,” he said.
Earlier Anonymous, which protested against what it perceives “web censorship” in several Indian cities today evening, had claimed that it attacked and took down CERT-IN website. “This is your response team #india! They can’t even protect themselves. How will they protect others,” read a tweet from @opindia_revenge, the group’s Twitter handle.