Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data mining to find the right poly bag makers
    Using Data Analytics to Choose the Best Poly Mailer Bags
    12 Min Read
    data analytics for pharmacy trends
    How Data Analytics Is Tracking Trends in the Pharmacy Industry
    5 Min Read
    car expense data analytics
    Data Analytics for Smarter Vehicle Expense Management
    10 Min Read
    image fx (60)
    Data Analytics Driving the Modern E-commerce Warehouse
    13 Min Read
    big data analytics in transporation
    Turning Data Into Decisions: How Analytics Improves Transportation Strategy
    3 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: The Four IT Security Principles: A Practical Guide to Improving Information Security
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > The Four IT Security Principles: A Practical Guide to Improving Information Security
Security

The Four IT Security Principles: A Practical Guide to Improving Information Security

ryanward
ryanward
5 Min Read
Image
SHARE

ImageBelow are four principles to help you become a more effective IT security leader. While these principles won’t solve all your problems, if you practice them regularly, you can’t help but reduce risks and knock annoying security problems off your to-do lists.

Start a difficult information security task

ImageBelow are four principles to help you become a more effective IT security leader. While these principles won’t solve all your problems, if you practice them regularly, you can’t help but reduce risks and knock annoying security problems off your to-do lists.

Start a difficult information security task

More Read

Image
Data-Driven Strategies for Resolving Cyber Threats as a Business Owner
The Harmful Side of Big Data: Identity Theft
Updates on Dronegate
Malicious Tool Provides Attackers with a New Type of Zombies
Big Data is Both a Weapon and Liability with Identity Theft

Every IT security leader has a laundry list of items that need to be fixed in an organization to improve information security and lower risk. Some of these issues may instill a certain fear or anxiety in you that prevents you from taking that first step. You probably have a few scary items written on post it notes around your desk right now, so why are you waiting? It could be because you don’t like who you have to deal with to accomplish the task, or maybe it isn’t in your technology comfort zone, or….

Regardless of the reasons, the best security leaders face their fears head-on and pick up that phone, schedule that meeting or send that email NOW to initiate change rather than wait. What are you waiting for?

Start one nagging issues right now. I’ll wait…Know your stuff

In my personal opinion, there are way too many IT security professionals who don’t truly understand enough about technology. Many of the current leaders rose through a support role focused in one particular area, but never took the time or have the ability to learn another discipline.

Understanding all aspects of IT including networks, development languages, databases/queries, server configurations, Unix, Windows, etc. dramatically improves a security leader’s effectiveness. If nothing else, it allows you to speak to technologists in their terms. It also lets them know that they cannot make something up just to avoid implementing a security fix.

If you don’t get funding for big projects, fix security operations

All too often, IT security leaders use “lack of funding” as an excuse for why they haven’t done more to lower risks. Funding will always be an issue, but even if you do not receive funding to implement an identity and access management solution, DLP solution or any other project, there are considerable ways to improve information security just within day-to-day operations.

This is where having broad technical skills can help you truly become an effective IT security leader because it allows you to design and drive architecture improvements without massive project teams. Aside from technology, process improvements, process redesign, and lean operations can always be a focus. These areas should not require an official project.

Don’t accept excuses from matrix-managed teams

From performing risk assessments at a variety of organizations, I see a large number of organizations living with open vulnerabilities. They don’t follow best practices simply, because nobody stands up to the individual technology towers and effectively influences them to change.

With technology, anything is possible, so it is up to you to manage external teams effectively. I have found that change is easier when you take an educational approach to influence technologists. An IT security leader must help technologists understand why certain settings pose environment risks. It often helps to frame risks around technology and security changes over the years. This approach can deflect resistance based on historical reasons.

By applying these four principles to your information security management practices, you can lower risk and become a more effective IT leader with minimal change and without increased budgets. Give it a shot!

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

data mining to find the right poly bag makers
Using Data Analytics to Choose the Best Poly Mailer Bags
Analytics Big Data Exclusive
data science importance of flexibility
Why Flexibility Defines the Future of Data Science
Big Data Exclusive
payment methods
How Data Analytics Is Transforming eCommerce Payments
Business Intelligence
cybersecurity essentials
Cybersecurity Essentials For Customer-Facing Platforms
Exclusive Infographic IT Security

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

artificial intelligence and IT security
Artificial IntelligenceExclusiveITSecurity

AI Cloud Developments Offer Remarkable Improvements in IT security

5 Min Read

What’s Missing From Most Cloud-Based Disaster Recovery? Network Replication

4 Min Read

Top 10 Software Glitches of 2011

2 Min Read

Identity and Privacy: Early Indications, June 2011

17 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive
ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?