Servers & Systems: The Right Compute
1752678 Members
5856 Online
108789 Solutions
New Article ๎ฅ‚
ComputeExperts

Re: Staying ahead of security threats

HPE understands how small to midsize business operates: its custom tailored security solutions provide much-needed protection for the many organizations under this umbrella.

Stay-out-of-security-trouble.png

Itโ€™s far, far easier to avoid or otherwise steer around security issues than it is to find and fix them. Thatโ€™s because the costs of reporting, remediation, and repair can be high enough to threaten business viability. Indeed, that goes double for smaller operations where unexpected and unplanned for costs can cause incredible difficulties.

Thus, understanding and preparing for security threats and vulnerabilities is an essential strategy to ensure (and allow) business success. Ultimately, managing security means managing and limiting risk. This involves a three-step process from which no business, no matter how small, is exempt:

Step 1: Identify those threats and vulnerabilities that might (or do) pose risks to the business, and assess potential impacts or consequences.

Step 2: Among items that do incur actual risks, prioritize them according to their costs or impact, so that the costliest or most damaging is addressed first, and so forth, in decreasing order.

Step 3: For items that warrant a response, set up risk mitigation and action plans to address them.

Best practice, particularly in businesses too small to support in-house security capability, is to subscribe to a threat intelligence and remediation service. This lets businesses outsource the security function to a seasoned and capable out-of-house team. Indeed, HPE and partners can help, and can identify, prioritize, and remediate security risks as part of their various security service offerings.

With cloud everything changes, security included 

Organizations of all sizes and scales are buying into the cloud. The ever-increasing number of cloud-based subscriptions and services introduces new and vexing threat vectors. Adding cloud into the mix makes for a more complex security situation. It also ups the ante forโ€”and the importance ofโ€”a proper security posture and sufficient robustness and resilience in IT infrastructures. Most experts recommend that businesses undertake the following tasks to ensure they can establish and maintain a proper security posture:

  • Align security strategy to business priorities: By understanding and filling the gaps between cybersecurity and business priorities, key players (management, stakeholders, and technology pros) can bring security strategy in line with business priorities. This also helps make sure resources and budgets match up. First and foremost, business leaders must agree on their security priorities and risk profiles.
  • Make security-first the watchword: Putting an emphasis on security helps businesses to thrive in an uncertain world rife with risks and threats. Protecting vital assets becomes a shared responsibility for all players. This means investing in staff security awareness (itโ€™s a leading contributor to cyber risk). It also means that everyone will understand and work to avoid, mitigate and handle cyberthreats.
  • Do unto yourself, before others do unto you: Cyber vulnerability analysis, aka security or penetration testing, means understanding your attack surfaces, and fixing vulnerabilities before attacks exploit them. This process is depicted in Figure 1, which shows the four stages of penetration testing (pen testing).

Figure 1: Pen testing works much like real attacks. It starts with reconnaissance, move onto analyzing and looking for weaknesses, then foisting indicated or well-known attacksFigure 1: Pen testing works much like real attacks. It starts with reconnaissance, move onto analyzing and looking for weaknesses, then foisting indicated or well-known attacks

 

How HPE (and partners) can help you secure IT

HPE and its partners offer businesses a broad range of cybersecurity solutions. All are designed to be comprehensive, innovative, robust, and affordable. In fact, HPEโ€™s security capabilities cover the gamut from hardware all the way to users and systems on the network edge. The prime objectives are to gather and analyze intelligence to track threats constantly, to secure systems and services in businesses against those threats, and to advise and assist clients in managing and minimizing the security risks they must face.

Download the full tech brief โ€œ2022 Global Study on Closing the IT Security Gapsโ€ to learn more about critical IT security needs. Let HPE provide insight, assistance, and security solutions to protect your very small, small, or midsize business from damage, loss, and harm. For more information, visit the HPE Small and Midsize Business IT Solutions page.


Ed Tittel.png

Meet our Compute Experts guest blogger Ed Tittel, technology writer/consultant

Ed Tittel is a longtime IT industry writer and consultant who covers tools, technologies, and security topics. Heโ€™s a regular contributor to ComputerWorld, TechTarget, and GoCertify. To learn more, please visit edtittel.com

 
 
About the Author

ComputeExperts

Our team of Hewlett Packard Enterprise server experts helps you to dive deep into relevant infrastructure topics.

Comments
daveju

the 4 stages in Pen testing, needs to be applied in the RInse and Repeat.  Complete all 4 stages then go back and start again and find out what is still open and possibly broken and see what happens.  Hardening a system is not a apply once and done.  it's a recursive thing 

bcady

This is nice high-level overview of things that a small business can do to help improve its security. It nicely explained what could be done and identified the different pieces that need to be examined. With many small businesses not having a dedicated IT department, it would've been nice to provide some type of checklist that a small business owner could easily follow to gather the information needed to find a starting point for improving their security. It also did not touch on the basic concept of a layered defense. Firewall router on the perimeter, software firewall and antivirus on the machines internally. These I would expect to be minimums for small businesses. Overall I think it was a nice introduction that may help to improve awareness.