Monitoring the use of removable media, regular penetration testing and defining action plans and roles are just some tips Processor offers that can thwart malicious types from infiltrating an organization’s perimeters. It is suggested that with careful planning, enterprises can effectively mobilize resources when security incidents occur.
"'Having a network security engineer is great, but who’s responsible for making sure the entire enterprise, in addition to the network, is being secured?' Beal asks.
'Many companies try to put the responsibility of security on the operation manager's plate, but does that person
have any security-specific training or background? Or do they even have the extra time it would take to develop a comprehensive security management program? The answer to both questions
is typically no.'"