Accessibility Statement Skip Navigation
  • Why PRWeb
  • How It Works
  • Who Uses It
  • Pricing
  • Login
  • GDPR
  • Create a Free Account
Return to PRWeb homepage
  • News
  • Resources
  • Contact
When typing in this field, a list of search results will appear and be automatically updated as you type.

Searching for your content...

No results found. Please change your search terms and try again.
  • News in Focus
      • Browse News Releases

      • All News Releases
      • Multimedia Gallery

      • All Multimedia
      • All Photos
      • All Videos
  • Business & Money
      • Auto & Transportation

      • Aerospace, Defense
      • Air Freight
      • Airlines & Aviation
      • Automotive
      • Maritime & Shipbuilding
      • Railroads and Intermodal Transportation
      • Supply Chain/Logistics
      • Transportation, Trucking & Railroad
      • Travel
      • Trucking and Road Transportation
      • View All Auto & Transportation

      • Business Technology

      • Blockchain
      • Broadcast Tech
      • Computer & Electronics
      • Computer Hardware
      • Computer Software
      • Data Analytics
      • Electronic Commerce
      • Electronic Components
      • Electronic Design Automation
      • Financial Technology
      • High Tech Security
      • Internet Technology
      • Nanotechnology
      • Networks
      • Peripherals
      • Semiconductors
      • View All Business Technology

      • Entertain­ment & Media

      • Advertising
      • Art
      • Books
      • Entertainment
      • Film and Motion Picture
      • Magazines
      • Music
      • Publishing & Information Services
      • Radio & Podcast
      • Television
      • View All Entertain­ment & Media

      • Financial Services & Investing

      • Accounting News & Issues
      • Acquisitions, Mergers and Takeovers
      • Banking & Financial Services
      • Bankruptcy
      • Bond & Stock Ratings
      • Conference Call Announcements
      • Contracts
      • Cryptocurrency
      • Dividends
      • Earnings
      • Earnings Forecasts & Projections
      • Financing Agreements
      • Insurance
      • Investments Opinions
      • Joint Ventures
      • Mutual Funds
      • Private Placement
      • Real Estate
      • Restructuring & Recapitalization
      • Sales Reports
      • Shareholder Activism
      • Shareholder Meetings
      • Stock Offering
      • Stock Split
      • Venture Capital
      • View All Financial Services & Investing

      • General Business

      • Awards
      • Commercial Real Estate
      • Corporate Expansion
      • Earnings
      • Environmental, Social and Governance (ESG)
      • Human Resource & Workforce Management
      • Licensing
      • New Products & Services
      • Obituaries
      • Outsourcing Businesses
      • Overseas Real Estate (non-US)
      • Personnel Announcements
      • Real Estate Transactions
      • Residential Real Estate
      • Small Business Services
      • Socially Responsible Investing
      • Surveys, Polls and Research
      • Trade Show News
      • View All General Business

  • Science & Tech
      • Consumer Technology

      • Artificial Intelligence
      • Blockchain
      • Cloud Computing/Internet of Things
      • Computer Electronics
      • Computer Hardware
      • Computer Software
      • Consumer Electronics
      • Cryptocurrency
      • Data Analytics
      • Electronic Commerce
      • Electronic Gaming
      • Financial Technology
      • Mobile Entertainment
      • Multimedia & Internet
      • Peripherals
      • Social Media
      • STEM (Science, Tech, Engineering, Math)
      • Supply Chain/Logistics
      • Wireless Communications
      • View All Consumer Technology

      • Energy & Natural Resources

      • Alternative Energies
      • Chemical
      • Electrical Utilities
      • Gas
      • General Manufacturing
      • Mining
      • Mining & Metals
      • Oil & Energy
      • Oil and Gas Discoveries
      • Utilities
      • Water Utilities
      • View All Energy & Natural Resources

      • Environ­ment

      • Conservation & Recycling
      • Environmental Issues
      • Environmental Policy
      • Environmental Products & Services
      • Green Technology
      • Natural Disasters
      • View All Environ­ment

      • Heavy Industry & Manufacturing

      • Aerospace & Defense
      • Agriculture
      • Chemical
      • Construction & Building
      • General Manufacturing
      • HVAC (Heating, Ventilation and Air-Conditioning)
      • Machinery
      • Machine Tools, Metalworking and Metallurgy
      • Mining
      • Mining & Metals
      • Paper, Forest Products & Containers
      • Precious Metals
      • Textiles
      • Tobacco
      • View All Heavy Industry & Manufacturing

      • Telecomm­unications

      • Carriers and Services
      • Mobile Entertainment
      • Networks
      • Peripherals
      • Telecommunications Equipment
      • Telecommunications Industry
      • VoIP (Voice over Internet Protocol)
      • Wireless Communications
      • View All Telecomm­unications

  • Lifestyle & Health
      • Consumer Products & Retail

      • Animals & Pets
      • Beers, Wines and Spirits
      • Beverages
      • Bridal Services
      • Cannabis
      • Cosmetics and Personal Care
      • Fashion
      • Food & Beverages
      • Furniture and Furnishings
      • Home Improvement
      • Household, Consumer & Cosmetics
      • Household Products
      • Jewelry
      • Non-Alcoholic Beverages
      • Office Products
      • Organic Food
      • Product Recalls
      • Restaurants
      • Retail
      • Supermarkets
      • Toys
      • View All Consumer Products & Retail

      • Entertain­ment & Media

      • Advertising
      • Art
      • Books
      • Entertainment
      • Film and Motion Picture
      • Magazines
      • Music
      • Publishing & Information Services
      • Radio & Podcast
      • Television
      • View All Entertain­ment & Media

      • Health

      • Biometrics
      • Biotechnology
      • Clinical Trials & Medical Discoveries
      • Dentistry
      • FDA Approval
      • Fitness/Wellness
      • Health Care & Hospitals
      • Health Insurance
      • Infection Control
      • International Medical Approval
      • Medical Equipment
      • Medical Pharmaceuticals
      • Mental Health
      • Pharmaceuticals
      • Supplementary Medicine
      • View All Health

      • Sports

      • General Sports
      • Outdoors, Camping & Hiking
      • Sporting Events
      • Sports Equipment & Accessories
      • View All Sports

      • Travel

      • Amusement Parks and Tourist Attractions
      • Gambling & Casinos
      • Hotels and Resorts
      • Leisure & Tourism
      • Outdoors, Camping & Hiking
      • Passenger Aviation
      • Travel Industry
      • View All Travel

  • Policy & Public Interest
      • Policy & Public Interest

      • Advocacy Group Opinion
      • Animal Welfare
      • Congressional & Presidential Campaigns
      • Corporate Social Responsibility
      • Domestic Policy
      • Economic News, Trends, Analysis
      • Education
      • Environmental
      • European Government
      • FDA Approval
      • Federal and State Legislation
      • Federal Executive Branch & Agency
      • Foreign Policy & International Affairs
      • Homeland Security
      • Labor & Union
      • Legal Issues
      • Natural Disasters
      • Not For Profit
      • Patent Law
      • Public Safety
      • Trade Policy
      • U.S. State Policy
      • View All Policy & Public Interest

  • People & Culture
      • People & Culture

      • Aboriginal, First Nations & Native American
      • African American
      • Asian American
      • Children
      • Diversity, Equity & Inclusion
      • Hispanic
      • Lesbian, Gay & Bisexual
      • Men's Interest
      • People with Disabilities
      • Religion
      • Senior Citizens
      • Veterans
      • Women
      • View All People & Culture

  • Hamburger menu
  • Cision PRWeb provides efficient communication tools to continuously engage with target audiences across multiple online channels
  • Create a Free Account
    • ALL CONTACT INFO
    • Contact Us


      11AM ET Sunday – 8PM ET Friday

  • Send a Release
  • Sign up
  • Log in
  • Resources
  • RSS
  • GDPR
  • News in Focus
    • Browse All News
    • Multimedia Gallery
  • Business & Money
    • Auto & Transportation
    • Business Technology
    • Entertain­ment & Media
    • Financial Services & Investing
    • General Business
  • Science & Tech
    • Consumer Technology
    • Energy & Natural Resources
    • Environ­ment
    • Heavy Industry & Manufacturing
    • Telecomm­unications
  • Lifestyle & Health
    • Consumer Products & Retail
    • Entertain­ment & Media
    • Health
    • Sports
    • Travel
  • Policy & Public Interest
  • People & Culture
    • People & Culture
  • Send a Release
  • Sign up
  • Log in
  • Resources
  • RSS
  • GDPR
  • Send a Release
  • Sign up
  • Log in
  • Resources
  • RSS
  • GDPR
  • Send a Release
  • Sign up
  • Log in
  • Resources
  • RSS
  • GDPR

Top 9 IT Security Assessment Must-Haves to Improve Computer Network Security
  • USA - English


News provided by

ETS - Einstein Technology Solutions

Jan 14, 2015, 03:00 ET

Share this article

Share toX

Share this article

Share toX

The Key to a Successful IT Security Assessment
The Key to a Successful IT Security Assessment

Everyone in the organization has a responsibility to learn how to protect themselves and be protective stewards of the organization's information.

Post this

Lombard, Illinois (PRWEB) January 14, 2015 -- With announcements of new security vulnerabilities coming every day, businesses are demanding that internal IT staff increase the level of computer network security within their organizations. It is critical that organizations prevent future corporate break-ins and theft of credit card information and proprietary data. Organizations everywhere need to take a proactive approach to IT security. Understanding IT security vulnerabilities is key to mitigating IT security risks, best directing investment in technologies, and training to protect an organization. This renewed focus has businesses seeking outside services from IT Security firms, and the service offering that comes up first is typically conducting an IT Security Assessment. This has many organizations asking what should be a part of such an engagement. ETS is an IT Security Consulting firm based in the Chicago area that offers customized and comprehensive IT Security Assessment services for clients. Listening to and understanding the client’s unique security requirements is key to making an IT Security Assessment engagement successful. To do so it is critical to understand what “must-haves” an IT Security Assessment should provide an organization.

Top 9 IT Security Assessment Must-Haves

1. Objectives Gathering – A productive outcome requires an analysis of objectives. Every organization is different and faces security threats from different vectors. Information and systems have different values and vulnerabilities. Most organizations also have limited resources and unfortunately it’s not always a cost-effective proposition to try to protect the business from every possible scenario or threat. Objectives should mirror the risk and impact associated with a break-in.

2. Inventory – Security threats can come from many different sources. Mobile devices, workstations, laptops, servers, cloud-based applications, support systems, and even Programmable Logic Controllers (PLCs) used by those in a manufacturing environment are common targets. Essentially, just about anything that connects to the network is potentially vulnerable. Many organizations are also utilizing cloud-based services that also need to be considered as part of a comprehensive IT Vulnerability Assessment.

3. Security Policy Review – Many security-related vulnerabilities are related to how organizations allow access to their systems and information. Having well-thought-out and documented security policies ensure that granted security access is understood and properly limited. This may include how vendors, alliance partners, and customers access data.

4. Password Management - Password policies and management are critical to the security of systems, networks, and data. If a hacker gains credentials to a business’s IT systems, they can simply bypass most security controls. Businesses must evaluate the frequency of password changes, the complexity of passwords, and even individual users' handling of passwords. A comprehensive IT Security Assessment should call out policy and training efforts required to secure passwords.

5. Patching Methodology – With so many devices and applications in corporate environments, effective
patching is critical to security. This is one of the most important practices in the security realm and the easiest way to quickly reduce the risk of security vulnerabilities. ETS offers Ongoing and Managed Services associated with patching that help to ensure an organization’s systems and applications are up to date and protected from known security vulnerabilities.

6. Vulnerability Scanning – Assuming that patching is up to date, a comprehensive IT Security Assessment may include vulnerability scanning. If you are not patching, vulnerability scanning may not be necessary immediately. Systems should first be patched, then vulnerability scanning can determine any remaining vulnerabilities to network security.

7. Gateway / Firewall Security – The ability to detect and eliminate potential security threats often starts at the entrance of the environment. Having an appropriate unified threat management solution helps you to understand and analyze suspicious traffic in the environment. Content Filtering is another critical area that can help reduce risk by proactively scanning web traffic for known malicious content.

8. Training – All the best systems in the world can be bypassed by a single click of the mouse.Security
Awareness Training
is an essential component to any comprehensive approach to organizational security. Taking up the conversation with associates about the importance of security and how to avoid targeted attacks is absolutely critical. An IT Security Assessment should always take training into consideration. IT Security is not just the IT department's responsibility. Everyone in the organization has a responsibility to learn how to protect themselves and be protective stewards of the organization's information.

9. Prioritized Action Items – Ultimately, the entire point of conducting an IT Security Assessment is to provide prioritized actionable next steps to further secure the environment. Recommendations should analyze areas of risk and highlight remediation actions. The organization needs to understand both the risk and cost of mitigation so that investment decisions can be made in the context of risk.

The ETS Consulting Methodology starts with listening so Contact a representative at ETS today to start the conversation.

Robert Rognstad, ETS - Einstein Technology Solutions, http://www.TrustETS.com, +1 630.620.1100, [email protected]

Modal title

The Key to a Successful IT Security Assessment
The Key to a Successful IT Security Assessment
The Key to a Successful IT Security Assessment

Contact PRWeb

  • 11AM ET Sunday – 8PM ET Friday
  • Contact Us

About PRWeb

  • About PRWeb
  • Partners
  • Partnership Programs
  • Editorial Guidelines
  • Resources

Why PRWeb

  • Why PRWeb
  • How It Works
  • Who Uses It
  • Pricing

Accounts

  • Create a Free Account
  • Log in
  • Contact Us

Do not sell or share my personal information:

  • Submit via [email protected] 
  • Call Privacy toll-free: 877-297-8921

Contact Cision

Products

About

My Services
  • All News Releases
  • Online Member Center
  • ProfNet
Cision Distribution Helpline
888-776-0942
  • Legal
  • Site Map
  • RSS
  • Cookie Settings
Copyright © 2025 Cision US Inc.