• Home
  • About
  • Contact Me

IT Managers Inbox

Resources for IT Managers

  • All Topics
    • Productivity Tips
    • IT Security
    • IT Operations
    • Help Desk
    • Management
    • Leadership
    • Project Management
    • IT Service Management
    • Career and Training
    • Featured Posts
  • Management
  • Leadership
  • Project Management
  • IT Service Management
  • Career and Training

Best Practices for Security Management

By Sam Grier

PC and lock  Protecting your Enterprise IT system from threats both external and internal becomes harder each day. There will always be new methods of intrusion and infection that threaten your system. Your Security Management group should develop a set of best practices to ensure that your IT infrastructure is secure and can continue to support your business.

Best Practices to Consider

  • Monitor your vendors for security information and patch releases. Always keep your patches up to date.
  • If a malicious code or other threat makes its way into your network, disable or block access to the affected services until you can apply a patch.
  • Enforce a strict company-wide password policy and require passwords to be changed at least every 90 days.
  • Configure your email servers to block or remove email that contains attachments that are commonly used to spread viruses. Examples are .EXE, .SCR, .VBS, .PIF and .BAT files.
  • Use controlled testing of the capabilities of your security system to expose potential vulnerabilities.
  • Monitor software installed on computers in the company to ensure that only authorized software is installed.
  • Have an emergency response plan in place and test it on a regular basis. You should have a backup-and-restore solution in place so if data is compromised or you have a catastrophic loss you will be able to recover any lost data.
  • Evaluate your off-site disaster recovery plan to ensure your organization can continue IT operations should an event or catastrophes occur. Include regular DR testing to ensure that your systems properly fail-over.
  • Education of your employees and management on good security practices should be an ongoing program. Email, the Internet and unauthorized installation of software should be highlighted. Consider removing Internet access from employees that do not require it to do their job.

These are just a few best practices to consider as part of your IT departments overall security plan. In order to ensure your Enterprise wide system is protected your Security Management team should continuously review their systems. Management must also give them the budget they need to secure your network and your data.

Share this:

  • Facebook
  • Twitter
  • LinkedIn
  • Email
  • More
  • Pinterest
  • Tumblr
  • Print
  • Reddit
  • Pocket
  • Instapaper

Related That May Interest You

Filed Under: IT Security Tagged With: Best Practices, IT Security, Security Management

Popular Articles

  • 13 Sites to Download Free eBooks
  • 10 Certifications to Improve Your IT Career
  • How To Deal With Low Morale in The Workplace
  • 5 Ways to Stay Positive in Negative Situations
  • How Passion For Your Job Can Lead To Success
  • How To Work Under Pressure
  • How To Write IT Technical Documentation
  • How To Convert An Email Into An Outlook Task
  • How to Plan a 5S System Launch
  • A 5S Office System - Part 1 Planning
  • Leadership Skills – The Top 5 Skills Needed For IT Leadership Roles
  • 5S System Step 1 - The Sort Step

Latest Tweets

  • Agile project management: A comprehensive guide | CIO https://t.co/lNOtb5MYKB March 2, 2018 5:05 pm
  • The Skills Companies Need Most in 2018 – And The Courses to Get Them - LinkedIn https://t.co/l8fWcK2BvD January 28, 2018 4:45 pm
  • What You Need to Know About Interviewing in 2018 | Official LinkedIn Blog https://t.co/m1zGkCLgpo January 28, 2018 2:05 pm
  • 50 best small companies to work for of 2017, according to employees - Business Insider https://t.co/DeDU2AAb9t December 4, 2017 5:01 pm
  • 2017’s Best & Worst Places to Start a Career #Career https://t.co/9VLvFI5JIu October 21, 2017 7:15 pm
  • Which Is More Important: Faster RAM or More RAM? https://t.co/hPzgQlw1yd September 9, 2017 1:05 pm
  • Leadership training: 10 online resources for developing leadership skills | CIO https://t.co/NeGCSlTyx8 September 5, 2017 3:55 pm
  • If your Wi-Fi router is on this list it might be vulnerable to hacking tools. https://t.co/DCGjoqTXmD June 17, 2017 3:50 pm
  • OneDrive Files On-Demand now available for Windows Insiders https://t.co/l1wNO24Xsp June 17, 2017 12:45 pm
  • Win7 Monthly Rollup KB 4022719 triggers printing problems in Internet Explorer @ AskWoody https://t.co/DdB74SBCmL June 16, 2017 1:00 pm
  • Follow ITManagersInbox On Twitter
IT Managers Inbox Runs On The Magazine Theme

© Copyright 2008-2018 IT Managers Inbox · All Rights Reserved

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.