<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Do we worry about hackers and forget about IT hygiene?

› › › BACK TO THE BLOG

[fa icon="calendar"] Oct 22, 2014 1:22:17 PM / by WALLIX

hackers-IT-security-data-hygiene.jpg

Am I the only person who thinks the coolest part of most action films is when the guy with just a laptop plants a virus in the most secure network in the history of networks bringing the western world to its knees?!

If we work in IT we love to hear about threats. What’s the latest vulnerability that a hacker can use to get to my data? What’s the latest social engineering trick? We might be forgiven for thinking that these kind of external threats are actually the only risks to our businesses.

Maintaining healthy IT systems is as important as protecting them


 

However interesting these threats are technically, the reality is that almost a third of IT professionals have no idea what the trends for data loss are in their organizations, that tells us that EVERY kind of potential threat needs to be considered.

Recent research has also shown that over a third of ex-employees still have access to corporate networks. Surely statistics like that highlight that maintaining healthy IT systems and infrastructure is just as important as protecting against external threats. Staying on top of user accounts or server access definitely is not as glamourous as thwarting villainous cyber threats, but it is the first and most simple step to securing your organizations data. This is particularly true if you’re required to meet a compliance standard like PCI where “tracking and monitoring” access form an integral part.

Wallix helps with network hygiene by engineering solutions that help to centralise and monitor access to servers and devices across business networks.

 

Get Access to our white paper : The Insider Threats Comic Book

Topics: Reaching IT Compliance

WALLIX

Written by WALLIX

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security