Communiquez avec les autres et partagez vos connaissances professionnelles

Inscrivez-vous ou connectez-vous pour rejoindre votre communauté professionnelle.

Suivre

How to minimize the risks of security breaches?

With big and small names falling prey for security breaches recently, what are some best practice tips for minimizing the risks of having holes in the design?

user-image
Question ajoutée par Yasmeen Husam , Web Developer , Al Fahid Systems
Date de publication: 2018/12/04
arslan kabeer
par arslan kabeer , Software Developer , STECKNOVA Islamabad

1) Eliminate vulnerabilities before applications go into production

2)  Address security in architecture, design, open-source, and third-party components

3) Adopt security tools that integrate into the developer’s environment

4) Analyze your application security risk profile so you can focus your efforts

5) Provide your staff with sufficient training in AppSec risks and skills

6)  Establish security blueprints outlining cloud security best practices

Utilisateur supprimé
par Utilisateur supprimé

Before implementing your system security ,you need to know what the issues are and how should it addressed. then enforce security practices. it is critical to conduct regular test on your security systems.

Venkatesh Murthy
par Venkatesh Murthy , Software Engineer , Konrad Technologies India

1. Regular risk assessment

2. Up-todate Security Software

3. Data Encryption and backup

4. Third party Data Security evaluations

5. Staff training and awareness

Renuka Sabapathi
par Renuka Sabapathi , Trainer and Implementation Manager , Knowledge Hub

1.Assess your weakness

2. Invite your employees to learn

3.Implement the secure practices

4.Implement Employee Biometrics

5.Formalize Protocols

6.Verfication in multiple ways

7.Perform Regular Test

8.Seek Cybersecurity

Ashika Mooruth
par Ashika Mooruth , Modern workplace lead , MC3

One of the weakest link in any organisation is its people when it comes to security breaches. A proper security awareness training, attack simulation trainings, making use of best in breed endpoint protection solutions, EDR and automated investigations tools will be very helpful to counter attack these breaches.

isra' isleem
par isra' isleem , HR , Abt Assoc. Health Service Delivery

By increasing the ITsecurity and by giving employees regular trainings on how to act if they encounter breaches and what kind of acts are considered breaches.

Thoubeeck Ahamed
par Thoubeeck Ahamed , Deputy Manager , Bharat FIH Limited

Creating Information Security Awareness for the individuals in the organization, Placing security devices in place if the data is transferred across Internet, Blocking of Vulnerable ports, Restriction of Social Media, Continuous Improvements on Information Security & Regular Assessments.

Sonali Chandregowda
par Sonali Chandregowda , Cloud Support Engineer , Accenture - India

good password knowledge, Update regularly,securing the router,Proper Backing up of data,Educating the employees, Installing Centralized Firewalls, Encryped Transmission.

Data breaches are not always intentional. Users can accidentally send protected data to the wrong email address or upload it to the wrong share; in fact, mistakes account for 17% of breaches, according to the well-known Verizon’s 2018 Data Breach Investigation Report.

bosy  fawzy
par bosy fawzy , Data Entry Specialist , botit

most companies do the following :-

they group the info on which is very important by order then they devin them to high levels of security and low levels and they make a private network and keep the servers between the employees local and for executive and administration jobs they should make it private to lower the risks of security breaches and information robbery

Muhanad Bashir Suliman Bashir Hakim
par Muhanad Bashir Suliman Bashir Hakim , CEO , Kartam Analytica Co.LLC

1. Backup all the time.

2. Security Patches update continuaslly.

3. Good monitring tools.

4. Documentation.

5. Training & Retraining.

More Questions Like This