NETWORK WORLD NEWSLETTER: AMY SCHURR ON IT LEADERSHIP
08/19/04
Today's focus:  Security suggestions

Dear [EMAIL PROTECTED],

In this issue:

* Cutter Consortium shares 15 actions to consider as part of a 
��responsible computing strategy
* Links related to IT Leadership
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by McAfee 

Visit the Enterprise Security Center, sponsored by McAfee(r), 
for an exclusive collection of news, whitepapers, information, 
analysis and strategy for securing your networks and systems. 
Learn new strategies for securing your servers and protecting 
your desktops from viruses. Get the latest information on how to 
stay on top of the latest threats to your network and bolster 
your skills in synergizing your IT staff as a critical business 
asset. 
http://www.fattail.com/redir/redirect.asp?CID=72592
_______________________________________________________________
CHECK OUT NW FUSION'S NEW WHITE PAPER LIBRARY 

Just launched: NW Fusion's White Paper Library with new features 
and improved capabilities! Sort NW Fusion's library of white 
papers by Date and Vendor, view white papers by TECHNICAL 
CATEGORY, mouse over white paper descriptions and take advantage 
of our IMPROVED white paper search engine. CLICK HERE: 
http://www.fattail.com/redir/redirect.asp?CID=72527
_______________________________________________________________

Today's focus:  Security suggestions

By Amy Schurr

While most security efforts focus on shoring up your company's 
network perimeter to keep the bad guys out, strong policy also 
entails making sure your computing assets aren't used to inflict 
harm on other companies or individuals. 

Cutter Consortium says the business and security risks 
associated with an increasingly interconnected society call for 
increased emphasis on responsible computing. "Once connected to 
the World Wide Web or the Internet, a company actively occupies 
a virtual space that is peopled with competitors, terrorists, 
children, environmentalists, lawyers - every segment of society 
- or actually, every segment of nearly every society on earth," 
says Lynne Ellen, a Cutter Consortium fellow. "Responsible 
computing strategies account for intended and unintended 
interactions with such communities."

Cutter shares 15 actions to consider as part of a responsible 
computing strategy: 

1. Establish strong identity management for access to the 
network. Remember the best authentication includes something you 
know, something you have, and something you are. Require at 
least two of these things.

2. Strictly control password management and administration.

3. Patch aggressively and strive for a process that allows all 
desktops to be patched in two days or less.

4. Divide your network into firewall-separated subnets. 
Carefully control traffic through the firewalls.

5. Don't rely on firewalls as the primary protection.

6. Manage all outbound traffic as aggressively as you manage 
inbound traffic.

7. Conduct regular network vulnerability assessments.

8. Eliminate modems.

9. Secure wireless networks.

10. Deploy intrusion protection devices and methods.

11. Deploy thin-client devices where possible because they 
aren't vulnerable to infections.

12. Carefully manage all interfaces between your company and 
others. Every contract should stipulate mutual security 
policies.

13. Learn what methods software vendors use to control the 
insertion of back doors in their products. Require the 
disclosure of all known back doors.

14. Develop a comprehensive, responsible computing policy, 
communicate it with employees, and develop methods for 
enforcement.

15. Regularly review security scenarios and establish an 
emergency response plan.

For more information about Cutter Consortium, go to 
<http://www.cutter.com/>
_______________________________________________________________
To contact: Amy Schurr

Amy Schurr is an editor for Network World's Management 
Strategies and Features sections. If you have any career topics 
you'd like her to cover or want to comment on this newsletter, 
you can reach her at <mailto:[EMAIL PROTECTED]>.
_______________________________________________________________
This newsletter is sponsored by McAfee 

Visit the Enterprise Security Center, sponsored by McAfee(r), 
for an exclusive collection of news, whitepapers, information, 
analysis and strategy for securing your networks and systems. 
Learn new strategies for securing your servers and protecting 
your desktops from viruses. Get the latest information on how to 
stay on top of the latest threats to your network and bolster 
your skills in synergizing your IT staff as a critical business 
asset. 
http://www.fattail.com/redir/redirect.asp?CID=72591
_______________________________________________________________
ARCHIVE LINKS

Archive of the IT Leadership newsletter:
http://www.nwfusion.com/newsletters/itlead/index.html
_______________________________________________________________
FEATURED READER RESOURCE
WONDERING IF YOUR PAY IS UP TO SNUFF?

Check out Network World's 2004 Salary Calculator to see if 
you're getting paid what you're worth. Using data collected in 
the 2004 Network World Salary Survey, we've programmed this 
calculator with several categories that could affect your pay. 
Answer the questions and find out what the average salary is for 
your job category. Click here:
<http://www.nwfusion.com/salary/2004/calculator.html>
_______________________________________________________________
May We Send You a Free Print Subscription? 
You've got the technology snapshot of your choice delivered 
at your fingertips each day. Now, extend your knowledge by 
receiving 51 FREE issues to our print publication. Apply 
today at http://www.subscribenw.com/nl2

International subscribers click here: 
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail 
newsletters, go to: 
<http://www.nwwsubscribe.com/Changes.aspx> 

To unsubscribe from promotional e-mail go to: 
<http://www.nwwsubscribe.com/Preferences.aspx> 

To change your e-mail address, go to: 
<http://www.nwwsubscribe.com/ChangeMail.aspx> 

Subscription questions? Contact Customer Service by replying to 
this message.

This message was sent to: [EMAIL PROTECTED] 
Please use this address when modifying your subscription. 
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor, 
at: <mailto:[EMAIL PROTECTED]> 

Inquiries to: NL Customer Service, Network World, Inc., 118 
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of 
Online Development, at: <mailto:[EMAIL PROTECTED]> 

Copyright Network World, Inc., 2004



------------------------ Yahoo! Groups Sponsor --------------------~--> 
Make a clean sweep of pop-up ads. Yahoo! Companion Toolbar.
Now with Pop-Up Blocker. Get it for free!
http://us.click.yahoo.com/L5YrjA/eSIIAA/yQLSAA/BCfwlB/TM
--------------------------------------------------------------------~-> 

 
Yahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/kumpulan/

<*> To unsubscribe from this group, send an email to:
    [EMAIL PROTECTED]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/
 

Reply via email to