ITauditSecurity
Skip to content
  • Home
  • About
  • Links
  • SiteMap
  • Twitter
  • Hidden
  • Copyright

Tag Archives: customer information

by ITauditSecurity | April 10, 2009 · 11:17 am

5 Security Steps for Non-Big Businesses

Lenny Zeltser suggest 5 steps that mid-market organizations can take down the security path:

  1. Identify key data flows
  2. Understand user interactions
  3. Examine the network perimeter
  4. Assess the servers and workstations
  5. Look at the applications

Continue reading →

Share this:

  • Click to print (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Telegram (Opens in new window)
  • Click to share on Pocket (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to email a link to a friend (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Skype (Opens in new window)

Like this:

Like Loading...

Leave a comment

Filed under Security

Tagged as application, Audit, baby steps, check the box, checklist, classify, configuration, crash, customer information, data flow, database, famous recipe, hack, home computer, insider, internet facing, lenny zeltser, mitigation, outsider, patch, perimeter, plan, risk, Security, server, sox, Technology, time card, USB drive, users, vendor, workstation

  • Enter your email address to to be notified of new posts by email.

    Join 1,312 other subscribers
  • Quick Links

    New IT Auditors Start Here
    CISA
    ACL Tips
    Blogging Tips
    Excel: Basic Data Analytics
    Ask a Question
    Reader Poll: Who R U?

  • Recent Posts

    • My Python Journey, Part 2
    • Battle of the AI Bots
    • My Python Journey, Part 1
    • Where’s Mack?
    • Most Popular Blog Posts of 2021
    • Shatter Silos to Identify More Risk
    • Software Components NOT Removed from Servers
    • ACL Table Already Open error message
    • My Favorite ACL Tricks
    • Quote: Not Concerned about General Ledger Changes
  • Top 7 Posts

    • Another Nail in ACL’s Coffin
    • My Python Journey, Part 1
    • My Python Journey, Part 2
    • PSPad: Great Text File Audit Tool
    • Is ACL Analytics Dying?
    • FREE CISA Study Guide
    • How to get an IT Audit job with little or no experience
  • Categories

  • Links

    • * Follow ME on Twitter *
    • Hidden
    • IT/Audit/Security Resources
  • Blogroll

    • Audit Monkey (not real active) The life and times of an Internal Auditor
    • risk3sixty IT audit blog
    • SANS Handler's Diary Daily security pulse
    • Security Monkey (not active, but still good content) Great security blog
ITauditSecurity · IT audit/security/analytics/analysis, HOW-TOs, humor, and a whole lot more…
Website Powered by WordPress.com.
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Follow Following
    • ITauditSecurity
    • Join 763 other followers
    • Already have a WordPress.com account? Log in now.
    • ITauditSecurity
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
%d bloggers like this: