Hardware protection, is it enough ?
Most businesses usually focus on hardware protection such as Intrusion Detection System (IDS), Intrusion Prevention System (IPS) and Security man, they are indispensable, but is it enough?
Treasury thefts are commonly seen in the movies, and real incidents continues to make headlines in every country: The estimated 65 million US dollars was stolen from Brazil Central Bank. Thieves digging a 200 meters long, four meters deep tunnel. In the reality, the weakness often appear in the "building structure", "access passageway" "Personnel control" and "Using Habit" for criminals use. Imagine what will happen to your core competitiveness if commercial confidentiality and sensitive information were access by competitor?
We recommend regular use of the network-based vulnerability assessment scanner to find out all existing vulnerability in the network environment, such as "software and operating systems," "communications port and protocol" "Internet use habit" ... Through vulnerability assessment management scanner provide patches to allow you to quickly determine the reinforcement to prevent weaknesses, put an end to all offensive invasion of any pipeline.
Author: Jason Lin
ISO/IEC 27001 Lead Auditor