CMI
  • Linkedin
  • Twitter
  • Facebook
  • Youtube
  • HOME
  • ADC
    • WHAT IS AN ADAPTABLE DATA CENTER®?
  • SOLUTIONS
      • CONVERGED INFRASTRUCTURE
      • DATA MANAGEMENT
      • FLASH SOLUTIONS
      • DATA CENTER OPTIMIZATION
    • SECURITY SOLUTIONS
      • Application Vulnerability
      • Endpoint Security Management
      • Enterprise Security Management
      • Security Inquiry
      • DSS-V Distributed Security System
    • CLOUD SOLUTIONS
      • Private, Public, & Hybrid Cloud
      • Automation and Orchestration
      • Cloud Management
      • Cloud Security
      • SaaS, PaaS, IaaS, ITaaS
        Solutions & Services
      • Cloud Workload Migration
  • SERVICES
      • SECURITY SOLUTIONS
      • SAAS, PAAS, IAAS AND ITAAS
      • PROJECT MANAGEMENT & ADMINISTRATION
      • ENTERPRISE APPLICATION
        DEVELOPMENT & SUPPORT
      • IT CAPABILITY AND MATURITY
        STRATEGIC PLANNING
      • MAINTENANCE CONTRACTS
      • HELP DESK
      • PARTNERS
      • Powered by M5
  • BLOG
  • NEWS
    • PRESS RELEASES
    • EVENTS
      • Calendar
      • Professional Communities
      • CISO Roundtable
      • CIO Roundtable
  • ABOUT US
      • WHY CMI?
      • LEADERSHIP
      • TESTIMONIALS
    • CAREERS
      • Job Listings
      • Apply
  • RESOURCES
    • DYNATRACE FREE TRIAL
    • ACT PORTAL
    • CLIENT PROFILES
    • YOUTUBE
    • WHITE PAPERS
    • PODCASTS
  • CONTACT US
  • Search
  • Menu
  • CMI Blog
  • CMI Blog

3 Simple Tips and Tricks for Enterprise Security

CMI – Keeping your Enterprise Secure

AdobeStock_70281884-[security-lock-on-techboard]-(2)Data breaches have become so ubiquitous that you do not really need to read the Ponemon Institute 20151 study to know that data breaches are expensive and becoming ever more so.  From a tech perspective, there are a few basic inexpensive steps we can take to make the potential breach just a little more difficult.

First, when you install a new piece of equipment, disable the default user accounts and create user accounts for only those users who need access, or use active directory or Lightweight directory access protocol (LDAP) to control use. LDAP integration, while initially more complicated to configure, certainly makes account maintenance much easier since passwords can be updated from a single management console.

Next, take advantage of new security features. Most storage devices and operating systems today allow users to encrypt hard drives. This is either a free feature or very inexpensive. It would be a shame to compromise your security by having data at rest unencrypted, when it is so easy to ensure that the data is unreadable.

Lastly, keep your firmware and device operating systems up-to-date. Don’t allow yourself to be an easy target for a newly remedied exploit by not taking advantage of updating your firmware. Most vendors allow you to subscribe to notifications so you are aware of new fixes as they are available. While updating equipment may seem daunting, it really has become much easier and most updates require no downtime. One of the most frustrating parts of my job is finding that I cannot access the WebUI of a piece of equipment with a current browser because that device has never been updated. Don’t allow your company to become a data breach victim because you didn’t keep your equipment firmware or OS current.

Disabling default user accounts, utilizing preexisting security features like encryption and keeping your firmware / devise operating systems up-to-date are three simple ways to protect your enterprise.  If you need help with any of these items, give CMI a call, we’ll be happy to assist or take care of it for you. We do these fixes all the time so we understand the intricacies of compatibility and how to best upgrade while limiting risk and downtime.


1Ponemon Institute LLC, 2015 Cost of Data Breach Study: Global Analysis, May 2015

Lance Hawkes

CMI – Your Adaptable Data Center Company

Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on Linkedin
  • Share by Mail
0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Categories

  • Adaptable Data Center
  • Cloud
  • CMI Updates
  • Company Update
  • Converged Infrastructure
  • Data Center
  • Flash
  • Hyper-Converged
  • IBM
  • Leadership
  • M5
  • Misc
  • News
  • Nutanix
  • Security
WHAT PEOPLE ARE SAYING

quote-close-sm.gifThe IT Assessment report was incredibly thorough and just what I had hoped for. I want us to move forward to post and with assistance from CMI, to screen candidates for the IT Manager. quote-close-sm.gifSandra L., CEO, Medical Services Company

LEARN MORE

CMI

655 Redwood Hwy, Suite 102
Mill Valley, CA 94941
Phone: 415.480.3636
Fax: 415.484.7298

 

©2019 CMI, A Solutions II Company
  • Linkedin
  • Twitter
  • Facebook
  • Youtube
  • Privacy Policy
  • Terms
  • Contact
  • Log In
CMI Looks Back, Gives Back Applications in the Adaptable Data Center®
Scroll to top