Security Moves from the Data Center to the Boardroom

Security is moving more into lines of business and more business heads are purchasing security, Robinson said.

“Technology is becoming more ingrained in business operations and security is becoming really critical to business operations. A lot of companies had security as part of the function of their overall IT team, but we're seeing it now pull out more and more into [into business],” he said. “The more I've looked at security over the past few years, the more I almost begin to think of it the same way that I would think of accounting or legal. You have to have it and you have to have some pretty deep knowledge and specialization around it. And I think that that's kind of the theme behind this new security report.”

Businesses have been stagnant the last few years regarding their security, but many are starting to take a more modern approach—understanding that it’s not just the technology and it’s not enough to just have a secure perimeter anymore.

“You have to think about processes, you have to think about education. That's not just something that companies can think about as a one-time initiative, like let's put these things in place and then kind of set it and forget it,” Robinson said.

Wire Transfers/Receipt of Payment

These are some of the most typical phishing attempts out there: asking for a wire transfer or asking for the user to click a link or open a file to check upon payment receipt. Clicking on that link or opening that file will install malware on the machine.

This needs to be taken extremely seriously, especially for those that are in positions where they deal with transactions daily. The general protocol is that every invoice received, unless specifically requested over the phone or face to face, should be accompanied by a courtesy call to make sure that the claim is legitimate.

Nothing should be opened or processed until that confirmation call has taken place. Once you do this on a repeated basis, your vendor community will learn your protocol and may even proactively call you before sending an invoice. That is an ideal security culture!
More Info: jobs that require a+ certification

Comments

Popular posts from this blog

Tech Industry Takes the Lead in Redefining Work

CompTIA A+ 220-1001 and A+ 220-1002 exam

Questions a+ certification