download issue 24 here - Help Net Security
download issue 24 here - Help Net Security
download issue 24 here - Help Net Security
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
This is not unlike other business operation,<br />
such as offshore software development or<br />
outsourced product fulfillment, w<strong>here</strong> longstanding<br />
benefits of such initiatives are not realized<br />
without oversight and monitoring<br />
authority.<br />
As such, budget debates must focus not just<br />
on what legacy systems to keep and what kind<br />
of security equipment to implement, but also<br />
on the individuals and resources needed to<br />
set overarching policies and management<br />
procedures; the absence of which will mean<br />
that all the money spent keeping up with the<br />
latest tools and systems will be fruitless.<br />
While security tools will also be essential to<br />
keep networks running optimally while protect-<br />
ing sensitive and confidential corporate data,<br />
such systems should not be procured and installed<br />
at the expense of getting the right person<br />
with the right equipment in place to monitor<br />
and respond to evolving <strong>issue</strong>s in accordance<br />
with a well established corporate IT policy.<br />
Companies that successfully thwart a cyber<br />
attack will possess a well integrated combination<br />
of the right tools with the right decision<br />
makers. No single algorithm or detection system<br />
will be enough, if staff members are not<br />
provided the training and tools to do their job.<br />
Make no mistake – people have and always<br />
will matter if organizations are to maintain a<br />
robust security posture.<br />
Max Huang is the Founder and President of O2<strong>Security</strong> (www.o2security.com), a manufacturer of highperformance<br />
network security appliances for small- to medium-businesses as well as remote/branch offices,<br />
large enterprises and service providers. Max can be reached at max.huang@o2security.com.<br />
www.insecuremag.com 48