• Grid View
  • List View
  • Research Bytes - Combating Back Door Vulnerabilities in Data Center Procedures

    Combating Back Door Vulnerabilities in Data Center Procedures

    Although IT professionals usually adhere to strict security guidelines when dealing with user systems, they sometimes drop their guard when the implement systems and procedures in the data center itself. This article highlights the security weaknesses that can be created by such administrative procedures and outlines common sense management practices that can close such back door vulnerabilities.

    March, 2006

  • IT Best Practices - Organizations Are Not Adopting Measures to Limit Impact of Security Intrusions

    Organizations Are Not Adopting Measures to Limit Impact of Security Intrusions

    The increasing threat of security intrusions has failed to motivate many organizations to take the steps necessary to protect their software, hardware, and data. Clearly the increase in these incidents shows a growing sophistication on the part of those that launch these attacks. The problem is however, exacerbated by organizations failing to adopt prudent measures that would either prevent intrusions or mitigate their impact. This article highlights the extent of security intrusions in surveyed companies by point of entry and by type, and it documents the extent to which the same companies are not implementing common security measures to defend against such attacks. (7 pp., 6 figs.)

    November, 2004