7 Cisco security tips
Cisco said that security information is no longer merely a fight against virus attacks or spam.
Cisco has just released its first annual security report with the launch of Cisco Security Center website (cisco.com/security). The report also makes predictions about security threats in 2008 along with advice from Cisco security experts.
Cisco has introduced seven categories of risk management, including security, physical, legal, reliability, identity, human, and political status gaps, and combining these categories with Capital security requirements involve anti-malware protection, data disclosure protection, enterprise risk management, disaster planning, and more.
According to John Stewart, general manager of Cisco security, information security is no longer merely a war against a virus attack or spam. Moreover, this also includes geopolitical, identification and legal factors. For example, stealing acts at large retail stores, accusations of attacking computer systems of Western governments .
Therefore, Mr. Stewart said, corporate security, personal and national information requires a higher level of coordination among former capital partners to work closely only when needed. "IT security teams, businesses, governments, law enforcement agencies, consumers, citizens: All are targets, and are allies of each other. Personal, business and national security will depend on collaboration and communication between all these entities, 'Mr. Steward said.
Cisco reports have provided some advice for each of the seven categories of risks. Here are some notable tips:
• Perform regular inspections in the organization about the goals of attracting attacks and assess the methods that can be used to attack. The abusive behavior is often successful because it does not follow the basic security principles: intrusion prevention at the server, patches and updates with fixing security errors, and checking regular assessment.
• Understand the concept of threats according to the usage model . When a new application or device is available, new threats will also appear.
• Changing the views of employees, consumers and citizens who consider themselves to be innocent people, empowering them to become positive people with authority friends are shared through security responsibilities. IT teams should be at the forefront of this task, but this is not just their own problem.
• Top priority for confidential education . Businesses, security providers and government agencies need to invest in security education as well as raise people's awareness of security. This effort should include industry-wide collaboration between partners as well as competitors in the market.
• Institutionalize IT security education by including it in the school curriculum.
• Pay more attention than just focusing on performance when building a secure network. Focus on the ability of the network to collaborate, test, adapt and solve security issues thoroughly, from network gateways (gateways) and servers to computers desktop and mobile devices.
• Security providers need to provide comprehensive security solutions that can be extended across network infrastructure, mixed applications and righteous data.
You should read it
- Cisco ASA 5585-X - The most powerful security device available today
- Warning: Detecting more than 1000 Cisco router and switch devices in Vietnam has a serious security error
- Set up Wi-Fi network only 3 steps
- Extremely powerful Wi-fi transmitter for businesses
- [Infographic] 5G network security: What service providers need to know
- Cisco security equipment is targeted at DoS attacks through an old vulnerability
- SD-WAN security options
- Review the Cisco RV180 VPN router
May be interested
- Instructions for configuring Cisco routersin this article we will provide you with a reference and reference material on configuring cisco routers. the method of configuring the cisco router used in the lesson is through the ios command line interface.
- How hackers steal 9 million USD from ATM in 1 hourcisco security experts explained the entire process that bad guys apply to withdraw the money with just over 100 real cards.
- 10 commands to master when working with Cisco IOSif you want to master the cisco ios, you need to learn some necessary commands. the following article will summarize 10 useful commands to handle various troubleshooting and configuration tasks.
- Cisco Router Configuration Guide 1800 series (Cisco 1801, 1802, 1803, 1811, 1812)this article will show you how to configure cisco 1800 series routers (cisco 1801, 1802, 1803, 1811, 1812) details from global parameter settings, routing, interface protocols, and command line access.
- SD-WAN security optionslet's look at sd-wan security and partnerships with suppliers, including aruba, cisco, riverbed and silver peak.
- How to Configure a Cisco Routerthis wikihow teaches you how to set up a cisco small business router on your local network. to get started, you'll need to connect to the router with a console cable and enable a web-based administration tool called cisco configuration...
- How to use PuTTY on Cisco routers and switchesputty, an open source, is an application protocol for transferring files over the network. it supports protocols like telnet, ssh, scp, rlogin, etc ... initially, putty was designed for the windows platform and it was later developed for different operating systems.
- Set up Wi-Fi network only 3 stepscisco systems cisco connect utility helps establish a fast wi-fi network connection in 'wink', in just 3 simple steps.
- Revealing a new variant of computer virus can destroy itself when detectedaccording to security researchers at cisco, a new type of malware called rombertik has just been discovered that can destroy itself important data stored in windows system files on the master boot record.
- Cisco sends fake phishing emails to employees to teach them not to click miscellaneousover the past few years, steve martino, information security manager at cisco has developed smart techniques to fight against cyber attacks.