ICT Security-Sécurité PC et Internet
87.1K views | +1 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Advice to IT Professionals on Social Engineering

Advice to IT Professionals on Social Engineering | ICT Security-Sécurité PC et Internet | Scoop.it

Advice to IT Professionals on Social Engineering
IT professionals are accustomed to thinking about the technical aspects of security.

 

However, as this report has shown, the human element—the techniques that attackers use to trick typical users into helping them—has become just as important for attackers as the technical element, if not more so. By implementing effective technical safeguards, programs, and processes designed to defend against social engineering, you can help your users avoid being taken advantage of by attackers.

 

You can even enlist them as some of your most valuable assets in the fight against security threats.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Managing Risk

Managing Risk | ICT Security-Sécurité PC et Internet | Scoop.it

Prevent and Mitigate Security Breaches
Encrypt data on all computers and storage devices, including removable storage devices and drives.


Use the Microsoft Security Assessment Tool (MSAT) to help identify risks in your IT security environment and build a plan to successfully manage the risk.


The Windows Security Compliance Toolkit contains step-by-step guidance for deploying BitLocker Drive Encryption and the Encrypting File System (EFS) in enterprise environments.


Use the Data Encryption Toolkit for Mobile PCs to effectively implement BitLocker and EFS for mobile PCs.
Be aware of the details of breach notification laws in all regions in which you conduct business. Work closely with your general counsel to follow the proper procedure in the event of a security breach. National and local laws vary considerably.
Consider using Object access auditing for items associated with the administrator accounts so that actions can be monitored.
Enforce the use of strong passwords throughout your organization.

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Information security awareness: Managing Risk

Information security awareness: Managing Risk | ICT Security-Sécurité PC et Internet | Scoop.it

Information security awareness and training are critical for any organization’s information security strategy and supporting security operations.


People are, in many cases, an organization’s last line of defense against threats such as malicious code, disgruntled employees, and malicious third parties.

 

It is, therefore, important to ===> educate <===  workers on what your organization considers appropriate security-conscious behavior and on the security best practices they need to incorporate in their daily business activities.


===> Transform your security message from “no” to “how.” <===

 

Demonstrate to your organization how to be secure rather than telling them what they can or cannot do. 

 

===> Gust MEES: This also applies to #education! Especially for #BYOD and #BYOT <===

 

Please check also: 

 

http://www.scoop.it/t/securite-pc-et-internet?tag=BYOD

No comment yet.
Scooped by Gust MEES
Scoop.it!

Security: What is a Botnet?

Security: What is a Botnet? | ICT Security-Sécurité PC et Internet | Scoop.it

Since the early days of the public Internet, the word bot (from robot) has referred to automated software programs that perform tasks on a network with some degree of autonomy.

 

Bots can perform many beneficial and even vital functions. For example, the web crawling software programs used by popular search engines to index web pages are a class of bots, and participants in the well-known SETI@HOME program (http://setiathome.berkeley.edu) voluntarily install bots on their computers that analyze radio telescope data for evidence of intelligent extraterrestrial life.

 

Unfortunately, bots can also be developed for malicious purposes, such as assembling networks of compromised computers—botnets—that are controlled remotely and surreptitiously by one or more individuals, called bot-herders.

No comment yet.