Page 12 - index
P. 12
Something else to consider is how we store our computers when traveling to and from work.
We may stop at a store and leave the device in our locked vehicle, unknowingly putting the
business device at risk. Many computers are stolen from cars that have been broken into. To
mitigate this risk, ensure your computer is out of sight and locked in the trunk if you are unable
to take it with you. If a business device is stolen or lost, you should communicate this to IT right
away to limit the risk of compromising the device. IT can even wipe the device if a solution has
been deployed, disabling the thief’s ability to access the network or content on the computer.
In closing, IT can deploy many solutions, services and/or applications to promote secure,
remote sessions for users. However, many of these controls can be trumped by end-users not
being vigilant of their own security practices. Having the appropriate IT solutions deployed and
an educated user base is imperative for establishing secure remote sessions into the company’s
network.
About the Author:
Bob Swanson is a Compliance Engineer with LogRhythm Labs where
he focuses on developing compliance packages according to new
regulations, assisting customers in meeting compliance obligations
while leveraging the LogRhythm solution to establish cyber security
programs. He has over 5 years of experience in both internal and
external IT auditing for Deloitte and Touche, LLP as well as building a
risk-based, IT compliance program around SOX, HIPAA and PCI-DSS
requirements. His compliance understanding expands into various
areas according to customer’s needs to meet an ever changing
compliance environment including, but not limited to: NERC-CIP,
NIST 800-53, NIST-CSF, ISO 27001, GPG-13.
Bob can be reached online at ([email protected]), www.logrhythm.com.
@LogRhythm
12 Cyber Warnings E-Magazine – July 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide