Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Newswire

Eight New Year’s Resolutions – Computer Security Wise

December 19, 2007

2008 is expected to continue the 2007 trend of increasing size, scope, and concentration of attacks on computer networks nationwide. Attacks are increasingly more targeted as malware, worms, and other malicious code to bypass simpler, more traditional network security systems. The year 2008 will likely see even greater emphasis on specific attack methods such as cross-site scripting, application-level attacks, and more client-side compromises. Security experts see significant new trends including “super worms” and XPATH injection attacks on the horizon.

“The idea of layered security has never been more crucial than it will be in 2008,” said Kevin Prince, Chief Security Officer, Perimeter eSecurity, a leading security SaaS provider that protects over 5000 computer networks nationwide, including those of more than 2,000 banks and financial institutions. “We expect an array of threats, both external and internal, which can only be met with a combination of layered security solutions,” he says. “In most network environments, security solutions are often misapplied, absent, or not comprehensive enough to stop the serious, credible intruder. This can lead to unacceptable levels of risk. The easiest and most affordable way to obtain a truly layered security approach and optimal risk profile is by accessing these services on demand from a reputable service provider, preferably one who is fully audited by highly regarded independent third parties.”

To protect computer networks from compromise, here are the top eight 2008 New Year’s resolutions any diligent network manager should make and keep in the year ahead:

1.    Implement Comprehensive Patch Management: Often some of the most sensitive data are on non-Microsoft systems such as Linux, UNIX or Macintosh. Invest in a patch management solution offering full visibility into your network and covering all operating systems and vendors, not just Microsoft.

2.    Conduct Employee Security Awareness Training: Raising the awareness level of employees through mandatory, monthly online courses is a terrific way to remind them that security is everyone’s responsibility. Choose a training program that offers up-to-date courses, ensures users understand policies and procedures, and provides reporting to management.

3.    Utilize Host-based Intrusion Prevention Systems (HIPS): Threats now bypass network intrusion detection systems (NIDS) using encryption, packet fragmentation, packet overlap, and encoding. Consider host-based intrusion prevention (HIPS) which can monitor your system looking for anomalous behavior, applications attempting to be installed, user escalation, and other non-standard events.

4.    Perform Network, Operating System and Application-level Testing: Most organizations perform basic external network and operating system vulnerability testing, which identifies many Internet exposures. It is important to perform testing at the application level because these attacks are becoming much more prevalent, but if caught early, can reduce major exposure.

5.    Employ URL Filtering: Organizations that still allow employees to browse the Web freely should understand and confront the risks of doing so. In addition to potential legal and reputational concerns, Web browsing opens a large window to viral attacks. A better alternative proactively manages sites where employees are allowed to surf, limiting them to safe, approved sites from reputable web publishers.

6.    Centralize your Desktop Protection: Desktop anti-virus has become an expected standard on most computers systems which is fundamentally good news. If you manage these systems individually, however, you may get unprotected systems and exposure. Make sure you have centralized management and reporting.

7.    Enforce a Robust Policy Management System: For some, policy management means enforcing complex passwords that change regularly. For others, it is restricted access from the “administrator” controls on a workstation. Still others think this is a way of reporting on anti-virus updates, patch levels, and operating system service pack levels. Implement a robust policy management system which includes all of the above at a minimum.

8.    Adopt an Extrusion Management Solution: Sensitive data leaks from organizations every day. This is often a result of employees sending emails. An extrusion management solution keeps sensitive data inside the network. Take the first step which might simply be an email content filtering solution that will allow you to monitor for sensitive data being sent through simple mail transfer protocol (SMTP).

About Perimeter eSecurity

As the only provider of complete security on demand, Perimeter eSecurity makes security easily available and affordable for all businesses. Perimeter's on demand security services protect thousands of computer networks nationwide, offering more than 50 different services on a subscription basis in the areas of: Vulnerability Defense, Intrusion Defense, Network Defense, Email Defense, System Defense, and User Defense. With the proliferation of security threats and technologies, clients benefit from a single-source provider that offers all services through one pre-integrated platform and web portal. Perimeter's security SaaS services are continuously expanded, enhanced and upgraded for current and future regulatory compliance. With seven geographically distributed technical offices and three redundant data centers, Perimeter's complete, on-demand and affordable security services are always available and have been validated by multiple independent third parties. For more information about Perimeter visit www.perimeterusa.com.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Eight New Year’s Resolutions – Computer Security WiseEight New Year’s Resolutions – Computer Security Wise

    See More
  • James Hadley Security podcast news header

    5 New Year's resolutions for CISOs

    See More
  • professionals- enews

    The 5 New Year’s Resolutions CSOs Should Have Made

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing