Talk With an Expert

Vulnerability Assessments: The Pro-active Steps to Secure Your Organization

Vulnerability Assessments: The Pro-active Steps to Secure Your Organization (PDF, 1.77MB)Published: 12 Jul, 2001
Created by
Robert Boyce

Every business contains an element of risk, ranging from issues of finance to product production. With the world of e-commerce continuing to emerge as the new industry standard businesses are faced with a new risk, the risk of technology. Malicious break-ins into corporate computer systems are mounting. Many information systems and services have not been designed to be secure. The security that can be achieved through technical means is limited, and should be supported by appropriate management and procedures. Identifying which controls should be in place requires careful planning and attention to detail.' (2) The ideal situation is for an organization to have built security into its computer information systems and telecommunications systems from the start. But this is not the case in many organizations. If the organization has not built in security then there may be serious vulnerabilities that exist some of which may have already been exploited by unauthorized individuals. Groups or individuals such as hackers organizations such as competitors or even elements of foreign governments may be taking advantage of vulnerabilities that go left unchecked.

Vulnerability Assessments: The Pro-active Steps to Secure Your Organization