- All systems are always vulnerable.
- Never put important information on a system you are not willing to secure and defend.
- Keep your users away from powers and abilities that will make your systems less secure.
- Be aware of where your information is, how it moves, and who has access to it.
The Four Rules of IT Security
Posted by daddybear71 on September 30, 2011
https://daddybearsden.com/2011/09/30/the-four-rules-of-it-security/
Previous Post
Thoughts on the Day
Thoughts on the Day
Next Post
Eagle Picture
Eagle Picture








Old NFO
/ October 1, 2011Yep, and if you were treated down it Texas under Tri-care, your info is out there… SAIC had a massive amount of patient info get hacked.
LikeLike
Borepatch
/ October 1, 2011Win.
Rule #5: Boot it, and they will come.
LikeLike
DaddyBear
/ October 1, 2011Yeah, I read about that NFO. Hopefully they were smart enough to encrypt their backup tapes.
And who uses tapes anymore? Lord, might as well be using stone tablets. Use a secure network to replicate your backups to a remote site. Quit hiring Barney to ferry media across town.
LikeLike