Jon: Overlooked best practices
by Volker Weber
The best thing about standards, it's said, is that you can choose from so many of them. Unfortunately, the same holds true for security best practices. Strong passwords, software updates, system hardening, encryption, anti-virus software, vulnerability scanning, intrusion detection, baselining, and log analysis -- the list goes on and on. It's a complex game that IT managers try to simplify by focusing on that convenient choke point, the firewall. But every network-connected device and every user can be the proverbial weak link in the chain.