The Tipping Point of PC Security

T

Previous events ought to validate that desktop computers seem to be as vulnerable as laptops and really should be heavily encrypted. The historical arguments that has been used not to encrypt the PC fleet has been:

1- not each and every one has Info that has to be protected
2- we cannot afford to encrypt all of the installed base, therefore, we are being selective
3- encryption is at the same time expensive
4- encryption cannot be cost justified for my business
5- we cannot afford it
6- we aren’t concerned, we go through the firewall protection
7- consultants simply over-react
8- nothing major has happened yet, so we will wait to see if It’s needed

My perspective has not only not been changed, but possibly even much more aggressive compared to before- encrypt, period. The logic at the rear of This is straightforward, as a consumer I have seen enough to convince me that to do otherwise is taking at the same time significantly of a risk.

From discussions with businesses, This very is now in the tipping point given that a single breach notification causes not merely the lose of manufacturer and goodwill, it may require counter measures and other potential implications.

The decision not to encrypt is now a conscious decision. This suggests that the facts of not doing so seem to be properly know already so an enterprise that doesn’t encrypt, accepts the potential liability and exposure. If the business does not think that the risk is real, a “bing” or “google” study would provide enough Information to likely convince otherwise.

Having set the table, here is my shortlist of actions that I believe businesses could/should take in regards to security towards the access devices, not in any order of priority:

1. get to Windows 7 whenever your company can, there can be a lot written about stability and security of W7 to XP
2. If your organization can virtualize, this ought to now be compelling
3. Encrypt all access devices- desktops and laptops
4. Improve asset management for hardware and software
5. BYOC- think about it further, you cannot secure consumer, unencrypted devices, in other words, stop and plan
6. Assume that There’s to be a breach, have you completed all that you can reasonably do?
7. Quantify the expenses of a breach, There’s enough history if you wish do that now
8. Think vertically, there are confident business verticals that preclude non-encryption, health care, pharma, life sciences, retail, and monetary services
9. Think horizontally, protecting consumer Info and your employee data as nicely as corporate intellectual property
10. Think about the megatrends in the market place- social media, consumerization, and mobility and add this in to the fabric of those review

As much more and much more breaches are reported, the infrastructure to protect will turn into more of a requirements. Delaying in creation of the infrastructure will probably cost more.

With broader consumerization comes better risks. Aside in one what I have positioned in the blog posting, what enablers and inhibitors do you and your enterprise see?

I am of those opinion and point of view, that we have hit the tipping point.

The preceding article was produced on behalf of King of Servers, specialists in HP servers for businesses. Does your company obtain a trustworthy HP server?

About the author

MitchellThomas1992
By MitchellThomas1992