7 Cisco security tips

Cisco said that security information is no longer merely a fight against virus attacks or spam.

Cisco has just released its first annual security report with the launch of Cisco Security Center website (cisco.com/security). The report also makes predictions about security threats in 2008 along with advice from Cisco security experts.

Cisco has launched seven categories of risk management, including security, physical, legal, reliability, identity, human, and political status gaps, and combining these categories with Capital security requirements involve anti-malware protection, data disclosure protection, enterprise risk management, disaster planning, and more.

Picture 1 of 7 Cisco security tips According to John Stewart, general manager of Cisco security, information security is no longer merely a fight against a virus attack or spam. Moreover, this also includes geopolitical, identification and legal factors. For example, stealing acts at major retail stores, accusations of attacking computer systems of Western governments .

Therefore, Mr. Stewart said, corporate security, information of individuals and countries requires a higher level of coordination among former capital partners to work closely only when needed. "IT security teams, businesses, governments, law enforcement agencies, consumers, citizens: All are targets, and are allies of each other. Personal, corporate and national security will depend on collaboration and communication between all these entities, 'Mr. Steward said.

Cisco reports have provided some advice for each of the seven categories of risks. Here are some notable tips:

Perform regular inspections in the organization about the goals of attracting attacks and assess the methods that can be used to attack. The abusive behavior is often successful because it does not follow the basic security principles: intrusion prevention at the server, patches and updates with fixing security errors, and checking regular assessment.

Understand the concept of threats according to the usage model . When a new application or device is available, new threats will also appear.

Changing the views of employees, consumers and citizens who consider themselves to be innocent people, empowering them to become positive people with authority friends are shared through security responsibilities. IT teams should be at the forefront of this task, but this is not just their own problem.

• Top priority for confidential education . Businesses, security providers and government agencies need to invest in security education as well as raise people's awareness of security. This effort should include industry-wide collaboration between partners as well as competitors in the market.

Institutionalize IT security education by incorporating it into the school curriculum.

Pay more attention than just focusing on performance when building a secure network. Focus on the ability of the network to collaborate, test, adapt and solve security issues thoroughly, from network gateway (gateways) and servers to computers desktop and mobile devices.

Security providers need to provide comprehensive security solutions that can be extended across the network infrastructure, mixed applications and righteous data.