832.204.4909

Secure Your Data in 2010 - Why a firewall isn't enough

by Yehuda Cagen 3. December 2009 06:21

 

 

2010 is just around the corner. The turn of a new year tends to spark optimism and hope. Yet the first quarter of 2009 in Houston kicked off with a nasty computer virus that shut down the Municipal Court system for several days.

 

Computer network consultants around town received calls from clients who wondered if their organization might become the next victim. Unfortunately when it comes to viruses, it may be too late. In fact, at Xvand we run into executives all the time who swear that their organization's data has been secured by the firewall they've installed on their computer systems.  

But is setting up a firewall the be-all and end-all of data security?  

According to Richard Kirk, UK Director for Fortify Software it isn't.  Because a firewall provides a gateway for users to explore the outside world, it becomes the very doorway by which hackers gain entry. Mr Kirk explains that hackers understand the typical code used and will exploit simple mistakes in programming and oversights in security efforts.

In fact, 67% of the breaches Verizon investigated in 2008 were “aided by significant errors.” Their 2009 Data Breach Investigation Report states that “only 17% of attacks were designated to be highly difficult.” Making 83% were not difficult and therefore avoidable.

So let's keep 2010 brimming with optimism. Implement strong IT policies and safeguards concerning employee web surfing, downloading and email attachments.  If your budget allows, set up a redundant data operation to switch to when things like this go horribly wrong.

If you still have concerns about data security, contact your local computer consultant and set up a security assessment (many Houston IT consulting firms will provide one free of charge) to ensure sure your data's safe in 2010.

 

Tags: ,

Comments

1/9/2010 12:56:10 PM #

pingback

Pingback from houstonsecurityservices.com

Houston Security Services | www.houstonsecurityservices.com

houstonsecurityservices.com

4/12/2010 11:00:29 AM #

pingback

Pingback from internet.markoware.com

Secure Your Data In 2010 – Why A Firewall Isn’t Enough «  MarkoWare.com

internet.markoware.com

6/12/2010 3:24:52 AM #

pingback

Pingback from law-law-law.info

Secure Your Data In 2010 – Why A Firewall Isn’t Enough-Law

law-law-law.info

8/6/2010 2:47:11 AM #

pingback

Pingback from remotepcaccess-software.com

Secure Your Data In 2010 – Why A Firewall Isn’t Enough | Remote PC Access Software

remotepcaccess-software.com

8/18/2010 2:12:21 PM #

pingback

Pingback from businessdedicatedserver.com

Secure Your Data In 2010 – Why A Firewall Isn’t Enough :: Business Dedicated Server

businessdedicatedserver.com

8/31/2010 5:13:16 PM #

pingback

Pingback from 1282.de

Secure Your Data In 2010 – Why A Firewall Isn’t Enough - Data, Computer, Business>, Secure, Securityl, Computers> - Iptables Informationen

1282.de

9/2/2010 6:32:22 PM #

pingback

Pingback from senangit.com

Secure Your Data In 2010 – Why A Firewall Isn’t Enough | senangit.com security

senangit.com

10/29/2010 1:37:14 PM #

pingback

Pingback from firewall-software.samsuntech.com

Secure Your Data In 2010 – Why A Firewall Isn't Enough

firewall-software.samsuntech.com

11/14/2010 11:04:36 AM #

pingback

Pingback from onlinesecurityblog.info

Secure Your Data In 2010 – Why A Firewall Isn’t Enough | Online Security Blog (OSB)

onlinesecurityblog.info

2/9/2011 9:55:03 AM #

pingback

Pingback from remote-data-backup-software.77software.com

Secure Your Data In 2010 – Why A Firewall Isn't Enough

remote-data-backup-software.77software.com

11/21/2011 12:34:35 PM #

pingback

Pingback from ezfreereport.com

yaz court case

ezfreereport.com

Add comment


(Will show your Gravatar icon)

  Country flag

biuquote
  • Comment
  • Preview
Loading



About IsUtility®

IsUtility® is a turnkey  Houston infor-
mation technology
solution that
brings accountability back to the IT
services industry. We've already
invested in your business - all the
servers and remote pc support -
eliminating the costs and risks of
owning  an onsite IT infrastructure.

Ask The Experts!

Send your IT questions directly to our knowledgeable experts. Since 2000, we’ve helped executives just like you make sense of business technology!
Name
Email
Your Question


Message was successfully sent

Email Newsletter icon, E-mail Newsletter icon, Email List icon, E-mail List icon Join our FREE Email Mailing List
For Email Marketing you can trust
Follow Us facebook twitter LinkedIn