Cybersecurity Security Starts with an External Audit

December 18, 2004 (PRLEAP.COM) Business News
4Terrorism will appear on World Business Review, hosted by General Alexander Haig. The segment focuses on Cyber Terrorism. Even before the attacks of September 11th, terrorism posed a serious threat to computer users everywhere. These days, even with new security measures in place, the threat still exists.

"Information security issues are complex and are often rooted in organizational and business concerns. Information security requires far more than the latest tool or technology. Organizations must understand exactly what they are trying to protect (and why) before selecting specific solutions. The vast majority of successful cyber-attacks are made possible by vulnerabilities in a small number of common services. Attackers usually take the easiest and most convenient route and exploit the best-known flaws with the most effective and widely available attack tools,' said 4Terrorism Chief Technology Officer Jim Bullough-Latsch.


Security systems are much talked about but many remain uncertain about what they entail and how to build and maintain one. The first step in establishing a system is to have an external audit of what a company now does for defense against a security violation. It is also important for those businesses and agencies that have a security system to have it periodically checked by an outside audit. The object of an audit is not to try to find vulnerabilities but to assess the overall effect of any vulnerability on effective operations. Simply finding vulnerabilities can often lead to misrepresenting the efforts of internal staff, unnecessary expenditures for internal remediation, possible negative impact on production systems, as well as increasing the risk by providing a road map to hackers. The best and most valuable security audit not only details vulnerability, but also gives an overall assessment. The report highlights the overall level of risk to the business and indicates what executive level decisions that should be made to improve and to maintain a consistent information security program.

Security Audits: http://www.4terrorism.com/securityaudits.htm
Cyber Security Resources: http://www.4terrorism.com/listtemp.htm

Computers and networks essentially run the operations of most business in the country. Most computer systems, computer software and networks were not designed with security in mind. Even most "secure systems' are riddled with vulnerabilities due to the underlying technology that could enable an attacker to disrupt operations or cause damage. We can help your company or organization develop a cost effective, threat effective, cyber security plan. We start first with an audit of your IT system and security and then develop an implementation plan that matches your business needs.


Resources for policies and computer security: http://www.4terrorism.com/ComputerSecurity.htm