基本HTML大乐透走势图500期图
Page 62 - 网络防御Emagazine - 2017年11月
P. 62

This  is  key  to  promote  cybersecurity  throughout  the  company.  A  CISO  helps  business
               executives, including the CEO, understand cyber risks and are essential to promoting a culture
               of cyber defense.


               In recent years, most CISO's have been connected to the company's leadership team, and in
               half  of  the  companies,  they  are  a  member  of  the  executive  leadership  team.  A  CEO  must
               understand and carry out security procedures throughout the entire enterprise. Together with
               the CISO, you can work together to run threat assessments and review the results.

               Consult the CISO on new projects early on in the planning phase so that they can find ways to
               improve security. It is easier to integrate security measures during the development rather than
               after the fact. The CISO will work with each team to find ways to meet the project goals in a way
               that  complements  security  protocols.  Then  it  is  up  to  the  CEO  to  make  sure  that  the  teams
               follow through and stay accountable.


               PROMOTE SECURITY AWARENESS WITH EDUCATION AND TRAINING

               Most companies have a cyber awareness program in place to educate employees.

               These programs train them to be able to identify network threats. An effective training program
               stays up to date to meet new security threats. An outdated program wastes time and resources.


               Take an active role in security awareness programs. By supporting these programs, you send a
               message to employees on what they can do to promote cybersecurity awareness. It is also up
               to your leadership to keep employees, managers, and other executives on track.

               Involving yourself in the training program helps to measure its effectiveness. You can see how
               many  users  have  completed  the  training  program,  along  with  parts  that  they  found  helpful.
               Employee surveys can provide feedback, and you can identify areas that need improvement.

               STRENGTHEN AND ADAPT SECURITY PROTOCOLS

               A risk assessment identifies areas in your IT security that need to be improved. Whenever your
               company  adds  new  equipment  or  software,  you  should  make  sure  that  it  keeps  the  existing
               network secure. Cybersecurity becomes more relevant as your business continues to add these
               new tools.

               By  the  year  2020,  there  will  be  between  20  to  30  billion  connected  devices  in  the  world.
               Connected  devices  provide  useful  information,  but  unprotected  they  can  be  a  liability.  Adapt
               your security protocols to reduce or eliminate these liabilities.

               Place  a  higher  priority  on  mobile  and connected  devices.  Your  cell  phone  that  allows  you  to
               connect to your business email can be a spot that hackers can exploit. Understand how these
               devices fit into the network, you can make the changes needed to strengthen the network.


               DECENTRALIZE ACCESS

               People, not technology, is the weakest point in your network.

                   62    Cyber Defense eMagazine – November 2017 Edition
                         Copyright © 2017, Cyber Defense Magazine,  All rights reserved worldwide.
   57   58   59   60   61   62   63   64   65   66   67