The Latest in IT Security

4 steps to build redundancy into your security team

24
Mar
2020
4 steps to build redundancy into your security team

image credit: unsplash

Avoid central points of failure or compromise.

This fundamental tenet of information security applies not only to systems and networks, but to individuals during a time of pandemic. Key cybersecurity staff, more often than not, possess singular knowledge of an organization’s infrastructure, including credentials. What happens if COVID-19 incapacitates a critical member of the security team for an extended time—or worse?

While the odds of any given individual winding up in the intensive care unit because of COVID-19 is small, given a large enough employee pool a certain number will inevitably become severely ill. Ensuring that no individual’s absence grinds your business to a halt should be top of mind for every security leader right now.

Read More

Comments are closed.

Categories

FRIDAY, APRIL 26, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments