April 13, 2012
If you’re in business, you’ve undoubtedly, at some specific point, given at least passing thought to system security, and if you haven’t, you must.
Perhaps you feel that your company has basically done all the right things. You have paid decent money for a top notch anti-virus programme. You’ve a stout firewall protecting the firm’s information, and password procedures in place for all your staff to follow, so what could go bad, right?
Sadly , a lot could go screwy, and if you sit behind these various pieces of technology and say that you’re safe, you might be in for a nasty surprise.
The reality is that when folk in business buy these “off the shelf” solutions, what they are getting is essentially a “cookie cutter” approach to system security, and the difficulty with that is that the cookie cutter methodology could be a great way to sell plenty of software, it usually leaves holes and openings in your system’s security.
Hackers are adept at finding and exploiting these gaps, and believe me, there are few people in the world who give more attention to those dull release notes that security software sellers release about the newest changes to their products.
For the hacking community, these represent an information goldmine. An opportunity to get a “look behind the curtain” and see what the software these corporations produce does, how it does it, and what kinds of security loopholes have been most lately closed. Also, the act of writing code to shut one loophole in a system may be the catalyst that opens another one.
Do not be smug. Don’t simply say that you are protected. That is a great way to wind up with ruinous data loss. If you haven’t had an independent third party conduct a security audit for you in more than a year, I encourage you to consider having one done soon.