“ The Center for Internet Security (CIS) ranks hardware inventory and control as the first level of basic control. CIS states that all equipment should be actively managed and that only authorized equipment should have access to the network,” says Ken McGee, president and owner of Data Security Consulting and Training. “Organizations need an accurate inventory to know what equipment is still on a locked office campus and what equipment employees have taken home. Equipment must be protected in both locations.”
In addition, data, so it should be encrypted. The encryption algorithm and encryption key should also be protected. Another option is to wipe the OS and data from abandoned hardware, so that if someone steals it, they only get the hardware, stripped of anything stored on the hard drive, in the memory, or on the chips on the motherboard, McGee advises.
Updating Business Continuity and Disaster macedonia mobile database Protocols
Business continuity (BC) and disaster recovery (DR) have taken on new meaning in 2020. As companies work to reopen their offices, they’re having to change last year’s protocols. “At the start of the pandemic, organizations were adjusting their BC and DR plans to accommodate the shift to remote work,” says John Beattie, principal consultant at business continuity provider Sungard Availability Services. “These plans need to be adjusted again to accommodate the return of employees to the office and the associated changes to the IT environment.”
Aandoned hardware may contain sensitive
-
- Posts: 531
- Joined: Mon Dec 23, 2024 3:11 am