Internet network security policies are flawed in strategy and implementation.
Gary suggests that the use of external consultants for the entire internet network security policy framework is not a great idea since the external consultants will find it difficult to grasp the intricacies and business drivers for the network security decisions.
Also, in terms of implementation, the internet network security policy should be disseminated to each and every employee of the company through seminars , handouts and quizzes rather than an innocuous email that no one reads.
The network security policy should capture the latest trends in the network security industry rather than playing catch up. One of the network security aspects that Internet network security policy makers should be worried about now is access to corporate data through a Blackberry or a mobile phone.
New ways of accessing internet cause internet security policy nightmares for CIOs. For example, most companies allow employees to access the corporate intranet mails thru Blackberrys. Also, some companies allow VPN access to the entire corporate intranet. All this is usually actually in violation of the existing corporate internet security policy which has to be rewritten.
In conclusion, internet network security policy implementors should focus on internal buy in among employees and proper dissemination to the entire IT work force,including contractors.This will ensure that the internet network security policy doesnt end up as a useless binder in your boss's cabin!
Saturday, September 8, 2007
Blog Archive
Categories
- 4 Things You Should Know About Hard Drive Crashes (1)
- A Complete Data Recovery Solution (1)
- back up for laptops (1)
- Backing Up Data on CD's and DVD's (1)
- Backing Up Your Data Frequently Can Save You Money (1)
- Bare Metal Server (1)
- Can I Recover Deleted Files? How to Retrieve Deleted Files (1)
- Consumers and Communications (1)
- Data Recovery (3)
- Data Recovery Freeware - Take Advantage of the Freeware Available to You (1)
- Data Recovery Help (1)
- Data Recovery Situations (1)
- Data Recovery Software (1)
- DBX File Corruption (1)
- Defragmenting Your Hard Drives (1)
- Diagnostic Tips For Hard Drive Data Recovery (1)
- Do You Back Up Your Website (1)
- Do You Know Where Your Data Is (1)
- Ease the Headache of Saving Files (1)
- File Recovery - 3 Ways I Prevent Hard Drive Crashes (1)
- Formatted Data Recovery (1)
- Fully Utilize the Full Benefit of a SAN With Automatic Defragmentation (1)
- Hard Disk Data Recovery - How to Restore Deleted Data (1)
- How to avoid data loss and data recovery (1)
- How to Backup Your Computer Hard Drive (1)
- How to Create an Offsite Data Backup and Restore Plan (1)
- How to Recover Lost Data From a Flash Drive (1)
- How to Recover Photos Deleted From SD Disk Or XD Card (1)
- How to Retrieve Deleted Data From Your Computer (1)
- How to Retrieve Deleted Files From Your Computer (1)
- Identity Theft by Selling a Used Computer (1)
- iPhone Data Recovery Advice (1)
- IT Disaster Recovery - A Finance Perspective (1)
- Laptop Backup Software Program (1)
- need laptop back up software (1)
- Online Backup and the Consequences of Data Loss For Business (1)
- Outlook Express Recovery (1)
- password finders (1)
- PDF Password Finder Tips (1)
- RAID Arrays (1)
- RAID Data Recovery (1)
- Recover Deleted Files - Vista (1)
- Recover Hard Disk Files - How to Recover Deleted Files (1)
- remove a password (1)
- Remove a Password From Your PDF Files (1)
- Restore Deleted Data (1)
- Restore Deleted Files - Vista (1)
- Retrieving Deleted Files From Your Computer (1)
- SQL Data Recovery (1)
- SQL Server Snapshot (1)
- SQL Servers (1)
- The Role of This Software Tool (1)
- Understanding Data Loss and Data Recovery (1)
- website back ups (1)
- What to Do When Everything is Lost (1)
- Why to Buy Online Data Back Up Services (1)
- Will Data Recovery Work (1)