How can I secure our data from hackers?
You can secure your data by building a risk assessment program that builds defense in depth. Broad steps include:
- Risk assessment
In reality, it's not always easy as you must try and find a balance between the protection cost and the value of the informational asset. For example, if you have an information classification system but also have encrypted data, you have put two security controls in place. In this example, strong controls have been placed on who has access to the information; the physical devices the information is located on has been secured; and when it is in transit it is only transmitted in a encrypted form. While this doesn't mean the information cannot be attacked or disclosed, it does mean you have placed several effective barriers that will deter its release.
Dig Deeper on Network Access Control
Related Q&A from Michael Gregg
Enterprise security expert, Michael Gregg answers a question regarding port 3389 issues when a user tries to open port 3389 RDP on their router to ... Continue Reading
Security expert Michael Gregg discusses the disadvantages to a layered approach to enterprise security. Continue Reading
Security expert Michael Gregg fields a question about unknown network cards gaining access to a user's network. Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.