Dr. Erdal Ozkaya
Search
  • Home
  • About Me
  • Home
  • About Me
  • Home
  • Cybersecurity, How to ...?
  • SECURITY MANAGEMENT – 101 Free Guide

SECURITY MANAGEMENT – 101 Free Guide

Erdal2021-07-14T19:42:47-04:00

SECURITY MANAGEMENT

To protect an organisation’s IT infrastructure and information, security management procedures should adopted. At a minimum an organisation should adopt he recommendations below.

Firewall

Table of Contents

  • Firewall
  • Anti-Virus Software
  • Security Patches
  • Spyware
  • Business Continuity
  • Wireless Networks
  • Spam Email
  • Internet

Use a firewall. A firewall acts as a barrier between the public internet and the organisations network. It helps to protect the servers and PC’s on the network from hackers and viruses.

Anti-Virus Software

Install up-to-date anti-virus software on all servers and PC’s on the network and all mobile devices such as laptops, tablets and smart phones. Anti-virus software is one of the main defences against online problems. It continually scans for viruses, including Trojans and worms.

Security Patches

Install the latest security patches for the applications and operating systems utilised by the organisation. As new threats emerge, regularly download the available security updates to ensure maximum protection.

Spyware

Implement measures and install software to stop spyware. Spyware is a threat to privacy and the information it can harvest from a computer can lead to financial fraud.

Business Continuity

Implement a disaster recovery plan to ensure that your organisation can recover from a business continuity event such as fire or floods. As part of this ensure that regular backups are made of organisation critical information. Backups are the last line of defence against hardware failure, or the damage caused by a security breach, or accidental deletion of data.

Wireless Networks

Wireless networks should be implemented in a secure fashion. Without suitable protection, such as a firewall and encryption, Wi-Fi (wireless) networks are vulnerable to eavesdropping, hackers and freeloaders.

Spam Email

Implement measures to stop spam email. It is extremely inefficient for an organisation’s staff to have to spend time dealing with unwanted spam email. Spam email clogs up inboxes and may contain viruses and spyware.

Internet

Browsing the internet can be dangerous. Malicious websites contain viruses and spyware and criminals create fake sites to steal personal information. Many websites also contain content that it would be inappropriate for an organisation’s staff to come in to contact with. Organisations implement systems to protect themselves from these dangers.

Security management 

Erdal Ozkaya

The Security and Risk Management Dr Erdal Ozkaya
Security and Risk Management Dr Erdal Ozkaya

 

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *


Related Posts

Future of Security Melbourne and Sydney

Future of Security Melbourne and Sydney 2022 – Free tickets available

Future of Security The Future of Security conference is FST’s dedicated security forum for Sydney and Melbourne, exploring the most pressing issues... read more

Microsoft Gulf Cybersecurity Master Class (2018)

  Microsoft Gulf Cybersecurity Master Class, it's always great to meet customers and talk about how we can help them more.... read more

Microsoft Turkey – Cybersecurity Webinar Recording : Watch 4 Free

This post has the links for my "Turkish Webinar which was recorded for Microsoft Turkey, therefore the post will... read more
Network Security Administrator Erdal

Network Security Administrator (ENSA) Free Certification Week 2

Network Security Administrator Lecture 2: Security Standards Security Policy Network Security Threats DEMO: Network security threats from real life Delivered by Erdal Ozkaya Week 1 : https://www.erdalozkaya.com/network-security-administrator/ ... read more
Hacking Countermeasures Erdal Ozkaya

Hacking Countermeasures – Lecture 4 : Free Hacking Course

Hacking Countermeasures Module 8: Penetration Testing Demo: What Pen Testers do to fight back against bad guys! Exam Review Erdal Join Charles Sturt Universities course... read more
Hey! You! Get off my Network!

Hey You Get off my Network! Great session at MSTE 11

Hey You Get off my Network! Unbelievable , more then 2000 Microsoft TechEd North America attendees joined my session where I... read more

Microsoft Offers CISO’s free Intelligent Security

Microsoft Offers CISO's Microsoft recently hosted the third edition of its popular CISO Executive Series in Oman, where industry experts and... read more
Feedback

Forensics class Feedback , Great one

Forensics class feedback If you have 30 seconds, please watch this awesome Feedback for my recent EC Council, Certified Ethical Investigator... read more

Pen Test Magazine – inspiring Interview with Erdal Ozkaya 2012

Pen Test Magazine - inspiring Interview with Erdal Ozkaya 2012 Erdal Ozkaya is the founder and Senior Microsoft Instructor of CEO... read more
Marshall University Cybersecurity Erdal

Text Book at Marshall University (2019) Important step in our journey

Text Book at Marshall University I can not describe how proud I feel when I receive good news like this ones. After... read more

Categories

  • About Dr Erdal Ozkaya (298)
    • Awards (96)
    • Erdal in the news (118)
    • Feedback (90)
    • My Books (54)
    • Who is Dr Erdal Ozkaya ? (2)
  • Announcemets (302)
  • Artificial Intelligence AI (11)
  • Certification (52)
  • Cloud Computing (72)
  • Cybersecurity (322)
  • Cybersecurity Leadership (52)
  • Financial Sector (31)
  • Forensics (17)
  • Free Events (156)
  • General (133)
  • How to …? (63)
  • ISO 2700x (12)
  • News (38)
  • Reviews (77)
    • Book Reviews (33)
    • Free E-Books (13)
    • Hardware Review (9)
    • Security Review / Reports (10)
    • Software Review (8)
  • Video Tutorials (101)
  • What is new? (27)
  • Windows (30)

Recent Comments

  • Erdal on Free EDR Certification Training
  • SANDEEP SHRIVASTAV on Free EDR Certification Training
  • Alicia Harlow on Core isolation Memory Integrity not available – (Get it fixed)
  • Alicia Harlow on Core isolation Memory Integrity not available – (Get it fixed)
  • Erdal on Siber Güvenlik Saldiri ve Savunma Stratejileri – NEW B00K

Archives

Dr. Erdal Ozkaya © Copyright 2023. All Rights Reserved.