Computer Network Security Resource Blog

Posted by Amy Besoushko
December 11, 2013

Data and network breaches continue to make headlines, and there’s no end in sight. In fact, with BYOD (bring your own device) becoming more common, and mobile devices beginning to overtake PCs in sales, data will continue to be exposed to unintended audiences. In 2011, mobile phone losses alone in the US accounted for $30 billion. Add to that amount the number of lost tablets, and you can see that mobile devices in general can expose an organization to computer network security nightmares.

We often blog on shifts in computer network security, so we thought it might be a good idea to compile some posts we think can help you protect your organization.

The first place to start is by reading our Eight Step Computer Network Security Assessment blog, which provides some best practices to follow when assessing your current security landscape. Understanding your current security vulnerabilities, how your network interacts with outside parties, and how your employees are connecting to your network is the first step in building your security solution.

Another good blog to check out would be from Chris Roberts’ keynote speech at INTERFACE a while back. Chris heads One World Labs, one of our computer network security partners. In his speech, he discusses the exposure of data in the cloud. Chances are you’re using some form of cloud computing currently, so understanding its role in your organization is also paramount.

And finally, with the addition of BYOD, you need to start thinking of a mobile device management (MDM) plan to include in your computer network security policies. Controlling these devices is going to become more important as PCs become legacy.

Heading into the holidays, it’s time to think about your network security plan for 2013 and beyond. Protect your company and data!

About Amy Besoushko Amy Besoushko has over 15 years of experience in IT marketing and a specialized skill set in graphic design and communication. As the Marketing Director at ASG, she manages all marketing activities by leveraging her in-depth understanding of technology trends, project/campaign design and execution, online marketing, and budget planning.

Filed Under: Network Security

2 Responses to 'Computer Network Security Resource Blog'

  • Smitha700, 05/26/2014 1:42 p.m. Some really nice and useful information on this web site, also I conceive the style and design holds superb features. aakgecdkkbgebeka
  • Chuck Bell, 09/10/2014 3:18 a.m. I have been trying to find this information. Thanks for all the points you have describe in this article.

Leave a Comment

Please copy "30D8FCjQpRbFqIvn5PXLGXs92VdbwxDL" into the field labeled "Uncaptcha"