Security Best Practices
There are a number of forums and commissions
within the computer security industry. These bodies made up of leading
consultants and experts in the field of information security for
companies and government agencies, are at work today establishing
the "best practices", the norms that should be used by
everyone interested in protecting information from loss, theft,
manipulation, and destruction by natural and human enemies.
ESTec consultants participate in some of the
most prominent forums, appearing there as technical experts, and
assisting the industry in identifying and documenting best practices
for each level of security..
Applying "best practices" to your
Since ESTec personnel work with the international
groups developing "best practices", we can assist your
organization in implementing the practices necessary to ensure that
your organization has met the due diligence necessary to prevent
all recognized intrusion methods. This preparedness protects your
company and its reputation while protecting the information provided
by your customers, partners and employees. As new threats are identified,
it is relatively simple to modify existing best practices and regain
safety for your data.
This protection is not offered without attention
to needs and costs, since every datum has associated purchase and
deployment expenses, as well as potential savings that can be measured
with a fair degree of certainty.
In most cases, achieving best practices in security
of information does not require that your company makes large or
repeated investments in esoteric technologies such as biometrics
-- eye-scans and fingerprinting, e.g. --to protect your information,
although achieving any business' best practices requires, above
all, that your organization takes information security seriously.
Beyond that critical step, choices appear that are only determined
by your company's requirements and situation.