How to Build a Holistic IT Security Strategy

people in a meeting looking at computer monitor
nd3000_istock_securitystrategy
In association with
AbacusNext logo
Share this content

Following the recent SamSam hack on five of 13 local government departments in Georgia, we are once again left wondering if there is anything firms and their clients can do to protect their networks from security breaches.

Attacking organizations is part of an alarming trend from the group deploying SamSam. They are freezing their computer systems and demanding a relatively small ransom, knowing the organization would rather pay up than remain offline for a week or pay to fix it themselves.

We’ve already discussed why accounting firms need an IT strategy and what characteristics that IT strategy needs to have. Now, we want to highlight a more nuanced look at what steps your firm needs to take to build a holistic IT security strategy to limit vulnerabilities and strengthen your network's security.

What Does It Mean to Have a Holistic Security Strategy?

In the past, the most common approach to IT security has focused on layers of perimeter defenses and building the best “wall” possible. But, because these attacks have become more sophisticated over time that approach is no longer sufficient.

Please Login or Register to read the full article

To access all of the content on our site, register (it's free!) or login to your existing account.

BONUS: If you register now you can opt to receive a digital copy of "Transform!" , Richard Francis' new book for growing firms [US/Canada ONLY].

About Alessandra Lezama

alessandra lezama

Alessandra Lezama is the CEO of AbacusNext, a software and private cloud services provider for the legal and accounting professions. 

Replies

Please login or register to join the discussion.

There are currently no replies, be the first to post a reply.