Page 2 - Diversified - Electronic Security Solutions - Best Practices Guide 1218
P. 2

In today’s fast-paced and constantly
       evolving global market, ensuring the
       safety of your organization’s critical data is
       no doubt a high priority. However, firewalls
       won’t stop an intruder from gaining
       physical  access to your  business, and  it’s
       just as important that your physical assets            ONE | KnoW your tHreats,
       are as equally secured as those in the cloud.
                                                               ONE |understand your risKs
       Physical security is the first line of defense
       against unwanted breaches to your                      “You do not achieve victory by defeating your enemy but
       enterprise, but with rapidly advancing                   rather by defeating your enemy’s strategy.” – Sun Tzu
       technologies, vendor and manufacturer
       consolidation, and increasing internal                 •  Effective security is designed in layers
       organizational  complexity,  selecting  the
       right solution and provider can prove to be            •  Identify key assets and high risk, high
       a daunting task.                                          vulnerability areas

       Evaluating all options and charting the                •  Talk to your internal people throughout your
       course for sound foundational solutions                   organization – a lot!
       that are capable of evolving as your                   •  Feedback from key areas of operations within your
       business needs change requires more                       organization creates well defined knowledge of
       than just product education and industry                  vulnerabilities, exposes areas of opportunity to add
       experience.  It requires insight into                     value to the overall organization and creates a culture
       market direction and provider positioning.                of security
       Additionally, variability in both internal
       and external risks to the success of your              •  Consider both traditional and non-traditional threats
       security  program  further  intensifies  the           •  Increasingly, the focus on core systems revolves
       criticality of having a solid programmatic                around “the Security of Security”!  Who has accessed
       and technological approach.
                                                                 your systems?  What data is being reviewed,
       Well designed and deployed solutions that                 exported, and made accessible to unapproved users?
       enable security and business practices                 •  Identify key processes and process changes that
       are the result of an intentional and well-                need to be implemented first. Then begin evaluating
       informed    process.    This   methodical                 and investing in technology solutions that will meet
       approach provides a comprehensive                         those needs.
       roadmap,     positions    your    security
       organization to drive improvement, and
       delivers exceptional value to your overall             best practice
       organization.                                          Consider developing internal organizational security

                                                              “champions” who inform your understanding of both
                                                              traditional and non-traditional sources of security threats.
   1   2   3   4   5   6