Editors note: This is a sponsored post provided by Cray.
There was a time when information systems security was much simpler. It focused on the appropriate time frame to take a sample of a one-dimensional system log that tracked events like blocked traffic, virus detection, and machines taken off-line. In this day and age, breaches, data theft, and cybercrime are rampant and not abating. Therefore, Cray has offered a few cybersecurity "best practices".
The goal of best practices (e.g., patch management, cyber hygiene, encryption and physical access controls) is to channel behaviors into manageable paths. But the real task of cybersecurity is to determine what behaviors look, feel and smell like threats — then head them off before they become problems.
Following a simple checklist for securing a PBX (private branch exchange) system will stop almost all hacks. Best practices are effective and educating personnel about them is important.
Securing information on a network has more to do with things unknown rather than known, but assigning value to unknowns is a difficult problem for any organization. Expending resources to discover an unknown is a hard sell when compared to finding a known issue that was found and managed x times last month and y times this month — especially when routine metrics are so easily aligned with absolutes such as percentage of compliance, number of systems updated and number of IP addresses blocked by a firewall.
Read more here on Cray.com.
Find out more information on Cray here.
This is a sponsored post written by Cognitio. Contact Us for information on sponsoring content of your own.
This post first appeared on CTOvision.com - Context For The CTO, CIO, CISO And, please read the originial post: here