NETWORK WORLD NEWSLETTER: AMY SCHURR ON IT LEADERSHIP 08/19/04 Today's focus: Security suggestions
Dear [EMAIL PROTECTED], In this issue: * Cutter Consortium shares 15 actions to consider as part of a ��responsible computing strategy * Links related to IT Leadership * Featured reader resource _______________________________________________________________ This newsletter is sponsored by McAfee Visit the Enterprise Security Center, sponsored by McAfee(r), for an exclusive collection of news, whitepapers, information, analysis and strategy for securing your networks and systems. Learn new strategies for securing your servers and protecting your desktops from viruses. Get the latest information on how to stay on top of the latest threats to your network and bolster your skills in synergizing your IT staff as a critical business asset. http://www.fattail.com/redir/redirect.asp?CID=72592 _______________________________________________________________ CHECK OUT NW FUSION'S NEW WHITE PAPER LIBRARY Just launched: NW Fusion's White Paper Library with new features and improved capabilities! Sort NW Fusion's library of white papers by Date and Vendor, view white papers by TECHNICAL CATEGORY, mouse over white paper descriptions and take advantage of our IMPROVED white paper search engine. CLICK HERE: http://www.fattail.com/redir/redirect.asp?CID=72527 _______________________________________________________________ Today's focus: Security suggestions By Amy Schurr While most security efforts focus on shoring up your company's network perimeter to keep the bad guys out, strong policy also entails making sure your computing assets aren't used to inflict harm on other companies or individuals. Cutter Consortium says the business and security risks associated with an increasingly interconnected society call for increased emphasis on responsible computing. "Once connected to the World Wide Web or the Internet, a company actively occupies a virtual space that is peopled with competitors, terrorists, children, environmentalists, lawyers - every segment of society - or actually, every segment of nearly every society on earth," says Lynne Ellen, a Cutter Consortium fellow. "Responsible computing strategies account for intended and unintended interactions with such communities." Cutter shares 15 actions to consider as part of a responsible computing strategy: 1. Establish strong identity management for access to the network. Remember the best authentication includes something you know, something you have, and something you are. Require at least two of these things. 2. Strictly control password management and administration. 3. Patch aggressively and strive for a process that allows all desktops to be patched in two days or less. 4. Divide your network into firewall-separated subnets. Carefully control traffic through the firewalls. 5. Don't rely on firewalls as the primary protection. 6. Manage all outbound traffic as aggressively as you manage inbound traffic. 7. Conduct regular network vulnerability assessments. 8. Eliminate modems. 9. Secure wireless networks. 10. Deploy intrusion protection devices and methods. 11. Deploy thin-client devices where possible because they aren't vulnerable to infections. 12. Carefully manage all interfaces between your company and others. Every contract should stipulate mutual security policies. 13. Learn what methods software vendors use to control the insertion of back doors in their products. Require the disclosure of all known back doors. 14. Develop a comprehensive, responsible computing policy, communicate it with employees, and develop methods for enforcement. 15. Regularly review security scenarios and establish an emergency response plan. For more information about Cutter Consortium, go to <http://www.cutter.com/> _______________________________________________________________ To contact: Amy Schurr Amy Schurr is an editor for Network World's Management Strategies and Features sections. If you have any career topics you'd like her to cover or want to comment on this newsletter, you can reach her at <mailto:[EMAIL PROTECTED]>. _______________________________________________________________ This newsletter is sponsored by McAfee Visit the Enterprise Security Center, sponsored by McAfee(r), for an exclusive collection of news, whitepapers, information, analysis and strategy for securing your networks and systems. Learn new strategies for securing your servers and protecting your desktops from viruses. Get the latest information on how to stay on top of the latest threats to your network and bolster your skills in synergizing your IT staff as a critical business asset. http://www.fattail.com/redir/redirect.asp?CID=72591 _______________________________________________________________ ARCHIVE LINKS Archive of the IT Leadership newsletter: http://www.nwfusion.com/newsletters/itlead/index.html _______________________________________________________________ FEATURED READER RESOURCE WONDERING IF YOUR PAY IS UP TO SNUFF? Check out Network World's 2004 Salary Calculator to see if you're getting paid what you're worth. Using data collected in the 2004 Network World Salary Survey, we've programmed this calculator with several categories that could affect your pay. Answer the questions and find out what the average salary is for your job category. Click here: <http://www.nwfusion.com/salary/2004/calculator.html> _______________________________________________________________ May We Send You a Free Print Subscription? You've got the technology snapshot of your choice delivered at your fingertips each day. Now, extend your knowledge by receiving 51 FREE issues to our print publication. Apply today at http://www.subscribenw.com/nl2 International subscribers click here: http://nww1.com/go/circ_promo.html _______________________________________________________________ SUBSCRIPTION SERVICES To subscribe or unsubscribe to any Network World e-mail newsletters, go to: <http://www.nwwsubscribe.com/Changes.aspx> To unsubscribe from promotional e-mail go to: <http://www.nwwsubscribe.com/Preferences.aspx> To change your e-mail address, go to: <http://www.nwwsubscribe.com/ChangeMail.aspx> Subscription questions? Contact Customer Service by replying to this message. This message was sent to: [EMAIL PROTECTED] Please use this address when modifying your subscription. _______________________________________________________________ Have editorial comments? Write Jeff Caruso, Newsletter Editor, at: <mailto:[EMAIL PROTECTED]> Inquiries to: NL Customer Service, Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 For advertising information, write Kevin Normandeau, V.P. of Online Development, at: <mailto:[EMAIL PROTECTED]> Copyright Network World, Inc., 2004 ------------------------ Yahoo! Groups Sponsor --------------------~--> Make a clean sweep of pop-up ads. Yahoo! Companion Toolbar. Now with Pop-Up Blocker. Get it for free! http://us.click.yahoo.com/L5YrjA/eSIIAA/yQLSAA/BCfwlB/TM --------------------------------------------------------------------~-> Yahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/kumpulan/ <*> To unsubscribe from this group, send an email to: [EMAIL PROTECTED] <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/
