The 5 biggest IT security mistakes

Like cleaning the windows, IT security can be a thankless task because they only notice when you don't do it

Like cleaning the windows, IT security can be a thankless task because they only notice when you don't do it. But to get the job done in the era of virtualization, smartphones and cloud computing, you've got to avoid technical and political mistakes. In particular, here are five security mistakes to avoid:

1. Thinking that the business mindset of the organization is the same as five years ago.

It's not. Your power and influence are being whittled away as the organization you work for flings open the doors to allowing employees to use personal mobile devices at work, and pushes traditional computing resources and applications into the cloud -- sometimes without your knowledge. You have to be proactive in introducing reasonable security practices onto what are fast-moving technology choices which are sometimes made by those outside the IT department altogether. It's a "mission-impossible" assignment, but it's yours. It may involve developing new policy guidance to clearly spell out risk factors so there are no false assumptions.

VIRTUALIZATION SECURITY: Shift to virtualized environments shaking up security practices

2. Failing to build working relationships with IT and upper-level managers.

IT security divisions are typically small in relation to the rest of the IT department. IT security leans on IT staffers to get basic security jobs done. The security professional may have specialized knowledge and a pocketful of certifications like the CISSP, but that doesn't mean he or she is necessarily admired or liked because of that -- especially as security people are usually the ones saying "no" to other people's projects. 

Moreover, don't think the power structure is always pointing toward the chief information officer as top decision maker. A fundamental shift is occurring in which the traditional role of the CIO as commander of IT projects is declining in favor of the rise of the chief financial officer having the final say on IT projects. Some evidence shows the CFO doesn't even like the IT department. The CFO's ideas about security may only go as far as the general legal idea of "compliance." The job for the security professional must be to communicate, communicate, communicate.

3. Not understanding that virtualization has pulled the rug out from under everyone's security footing.

Organizations are well on their way to achieving 80 per cent virtualization of their server infrastructure, and desktop virtualization projects are increasing. But security is lagging, with many incorrectly assuming it begins and ends with VLANs. The reality is that virtualization architectures change everything by opening new pathways that can be exploited. As has happened so many times before in the IT industry, groundbreaking technologies have become available for use with inadequate attention paid to the security impact. 

Some traditional security products, such as anti-virus software for instance, often don't work well in virtual machines. Physical appliances may have new "blind spots." Today, specialized security products for virtualized environments are finally coming to market -- and security professionals need to figure out if any of them should be used, while also keeping up with evolving security plans from vendors such as VMware, Microsoft and Citrix. Virtualization holds tremendous promise in eventually improving security, especially disaster recovery.

4. Not preparing for a data breach.

It's the nightmare scenario in which sensitive data is either stolen or accidentally leaked. In addition to technical detection and remediation, the law needs to be followed regarding data breaches. But which laws? Almost every state now has its own data-breach laws and some federal rules, such as the HI-TECH Act, impact some industries, like healthcare. When it happens, a data breach is going to be an event -- and an expensive one at that -- that requires coordinated participation by the IT security manager, the IT department , the legal department, human resources and the public affairs divisions, if not more. Organizations should be meeting to plan for worst-case scenarios, conducting a data-breach drill internally.

5. Complacency with IT security vendors.

It's necessary to have solid "partnerships" with IT and security vendors. But the danger in any vendor relationship is forgetting how to look at products and services with a critical eye, particularly in terms of sizing up what they have in relation to their competition or finding new approaches to basic problems of authentication and authorization, vulnerability assessment and malware protection. Many vendors are struggling to adapt traditional security controls to the realms of virtualization and cloud computing. In some sense, it's a time of chaos as the IT industry undergoes a reinvention. But that only means that IT security is going to have to push harder to get what it believes the organization needs now or in the future.

Read more about wide area network in Network World's Wide Area Network section.

Join the PC World newsletter!

Error: Please check your email address.

Tags Configuration / maintenancesecurityNetworkinghardware systemssmartphoneswirelessinternetcloud computingData Centervirtualizationconsumer electronics

Struggling for Christmas presents this year? Check out our Christmas Gift Guide for some top tech suggestions and more.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Ellen Messmer

Network World

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?