Implementing Effective Multi-System Enterprise Security

Written by admin

Finding ways to complement effective password management, IT security and other processes to make certain that business computers are secure is one of the most challenging things enterprise IT departments face.

What is the best way to make certain that employees and managers use good passwords, manage their password lists and keep their login information safe? Here are some things to consider.

Choosing Good Passwords 

Most security-conscious developers know there is very little difference between strong passwords and what might qualify as line noise. Most IT workers on the other hand like being able to get into their computers without having to remember a 19 character string of letters and numbers that don’t make any sense. Efficiency is always a high priority, especially if time is at a premium.

The best way to come up with good passwords is with something called a mnemonic. A mnemonic is a system for remembering patterns. It can be applied across many different passwords instead of uniquely being applied to one at a time. Mnemonics are one of the most efficient ways to come up with relatively secure passwords without spending an inordinate amount of time on each one.

Recognizing Risk

The fastest way to put a network of computers at risk is to create a security system or a category of risks that cannot be properly recognized by the average person in an organization. Security is only as effective as ability of the person least likely to notice something out of the ordinary.

It is incumbent upon enterprise management to see to it user training helps the average worker understand how computers can be compromised so that they can test and defend against potential security breaches on their own.

When effective systems like these are put into place and supported by ongoing training, the likelihood of an intrusion drops dramatically.

It’s All About Hardware

Each computer system in an enterprise network, whether it is a large-scale server or a small automation controller, is deserving of the same security priority. The reason for this is very simple. The smallest computers are generally the ones with the largest potential “surface area” vulnerable to common attack vectors. Companies like Winsystems know how important it is that these systems be secured first using methods that can then be advanced to the entire enterprise.

If an intruder has the time to plan, the network itself can become a major liability for the average IT department. Most security experts will agree the likelihood of internal security from system to system being as rigorous as the outward-facing firewalls and login pages is fairly low for the same reason most people don’t lock the doors inside their home as the move from room to room. This is why it is so important for the average employee to understand and implement a competent security policy on their own.

IT security and good password management don’t have to be cumbersome issues. With the right training, the right information and an ongoing commitment it is possible to provide above-average protection to networks of any size at manageable levels of cost, time and equipment.

About the author