Negative approach?  Maybe.  But if you are the person in charge of ensuring your IT network and systems are buttoned up from all manner of malicious intruders, sometimes clueless users and a growing world of creatively uncovered and exploited vulnerabilities, your job could literally be on the line with a single network security breach. We’ve all read the news – enough said.

Don't lose your job due to a security breach!

Image credit: Dave Bleasedale Licensed under: CC BY 2.0

And if you are that guy or gal, you probably (even hopefully) have taken the basic steps to protect your systems and your data. If you haven’t gotten to all of these safeguards, you had better get out your “to do” list pronto, or at least update your resume.

What then, are the basic steps? Let’s tick off the most frequently implemented and readily available security safeguards:

  1. Antivirus Software – once considered the only line of defense, it’s imperative that this is in place, current and enforced on all of your managed endpoint systems.
  2. Firewalls – no longer just for larger organizations, next gen firewalls offer new technologies for providing added protection and peace of mind, and they can be both affordable and easy to manage.
  3. Proactive Threat Detection – scans such as OVAL and SCAP can put you ahead of the curve in finding and remediating security holes in your IT endpoints.
  4. Patching – you are patching your operating systems and applications regularly, correct? If not, this is the starting point for eliminating vulnerabilities using the latest versions of software available.
  5. Data Encryption – security from the data level to the cloud is today’s mantra, so make sure you start with endpoint data encryption for a solid defense for lost or stolen devices.

But what about today’s more sophisticated threats?

Consider the number of operating systems you are now slated to secure, the number of BYO devices that are a normal part of your organization’s operation in the form of smartphones, tablets and even wearable devices, and the Internet of Things, not to mention added entry points in the cloud, on social networks and via web services— your list quickly grows beyond basic safeguards to the increasingly complex.

Are you aware of such new trends as predictive analytics, full lifecycle threat analysis and how to integrate these with comprehensive systems management for improved security? If it sounds like another “to do” list is on the horizon, you are right. But it’s a necessary one.

Want to learn more? We’ll be covering these topics in an upcoming live web event featuring IDC analyst Chris Christianson and an expert from the Dell Software security team. We’ll be discussing both security basics, as well as the latest in security considerations for holistic, practical implementations that will help you keep your job. Register now and join us on June 25.

About Stephen Hatch

Stephen is a Senior Product Marketing Manager for Dell KACE. He has over eight years of experience with KACE and over 20 years of marketing communications experience.

View all posts by Stephen Hatch