2
CHECKLIST Whether you’re a mighty army of one or 1,000, businesses must find a way to safely navigate an always-evolving threat landscape. By combining a security-focused state of mind and state-of-the-art hardware innovation, comprehensive security becomes a natural function of everything the business does — people, processes, and products. 1. UNDERSTAND YOUR DATA The principle is simple: Determine which data is the most sensitive, and secure it accordingly. Experts call it classification, but it’s really just about prioritizing security based on the impact a breach of that data would have on your business — and then choosing controls to apply. 2. TAKE 30 SECONDS TO ASSESS RISK Everybody is at risk for threats to data security, especially on wireless networks. That’s the bad news. The good news is everyone can learn to quickly evaluate the risk with a few key questions: Are you using public Wi-Fi? Is it secure? Is your browser secure (HTTPS)? If continuing feels risky, seek an alternative such as a VPN connection. 3. ENFORCE STRONG PASSWORDS A strong password — one that’s long, includes different types of characters, and doesn’t rely on dictionary words — can go a long way toward protecting data. But strong passwords can be hard to remember and manage. Do require strong passwords, but offer a single sign-on solution to make managing them easier. 4. KNOW YOUR ENEMY Would your employees know a phishing attack if they saw one? What about a suspicious phone call asking about account information? Learn to spot potential security threats as well as what to do (and what not to do) when they happen. 5. INSIST ON STANDARDS Standards groups are hard at work developing secure computing principles optimized for modern business. Look for systems that are designed to industry- standard security requirements from organizations like NIST and TCG, built with certified components, and distributed through a secure supply chain. HABITS AND HARDWARE : A Checklist for Building a Smarter Security Posture Secure your information and your business with the right balance of people, processes, and products. Sponsored by Lenovo and Intel ®

A Checklist for Building a Smarter Security Posture

  • Upload
    lenovo

  • View
    390

  • Download
    1

Embed Size (px)

Citation preview

Page 1: A Checklist for Building a Smarter Security Posture

CHECKLIST

Whether you’re a mighty army of one or 1,000, businesses must find a way to safely navigate an always-evolving threat landscape. By combining a security-focused state of mind and state-of-the-art hardware innovation, comprehensive security becomes a natural function of everything the business does — people, processes, and products.

1. UNDERSTAND YOUR DATAThe principle is simple: Determine which data is the most sensitive, and secure it accordingly. Experts call it classification, but it’s really just about prioritizing security based on the impact a breach of that data would have on your business — and then choosing controls to apply.

2. TAKE 30 SECONDS TO ASSESS RISKEverybody is at risk for threats to data security, especially on wireless networks. That’s the bad news. The good news is everyone can learn to quickly evaluate the risk with a few key questions: Are you using public Wi-Fi? Is it secure? Is your browser secure (HTTPS)? If continuing feels risky, seek an alternative such as a VPN connection.

3. ENFORCE STRONG PASSWORDSA strong password — one that’s long, includes different types of characters, and doesn’t rely on dictionary words — can go a long way toward protecting data. But strong passwords can be hard to remember and manage. Do require strong passwords, but offer a single sign-on solution to make managing them easier.

4. KNOW YOUR ENEMYWould your employees know a phishing attack if they saw one? What about a suspicious phone call asking about account information? Learn to spot potential security threats as well as what to do (and what not to do) when they happen.

5. INSIST ON STANDARDSStandards groups are hard at work developing secure computing principles optimized for modern business. Look for systems that are designed to industry-standard security requirements from organizations like NIST and TCG, built with certified components, and distributed through a secure supply chain.

HABITS AND HARDWARE:

A Checklist for Building a Smarter Security Posture

Secure your information and your business with the right balance of people, processes, and products.

Sponsored by Lenovo and Intel®

Page 2: A Checklist for Building a Smarter Security Posture

CHECKLIST

6. APPLY ADVANCED AUTHENTICATIONTwo-factor authentication adds an extra step to the login process to make it harder to breach security. Instead of just entering a password, a user offers further proof of identity by answering a question, swiping or scanning a card or other object, or even providing a biometric like a fingerprint or voiceprint.

7. SECURE YOUR DEVICES FROM THE CPU UPNew technologies are embedding powerful security capabilities directly into the device CPU, giving users the best chance to stay protected in the face of rapidly evolving threats. This gives users data encryption, identity protection, and even trusted application execution right from the start.

8. KEEP SENSITIVE DATA CONTAINEDGo beyond the hardware to protect data in secure virtual “containers.” These are encrypted areas of a device where sensitive information can be segregated away so that malware or other threats aren’t able to interact with it. It’s a good way to exert control over data that requires absolutely no special effort on the user’s part.

As the world’s No. 1 provider of technology to businesses of all sizes, Lenovo is committed to bringing our very best to everything you do. Driven by thoughtful design, purposeful engineering, and nonstop performance, our ThinkPad and ThinkCentre X1 products, powered by Intel, deliver breakthrough innovation that really matters.

YOUR PARTNER IN REAL SECURITY

The bad guys are hard at work every

day, and they appreciate how easy

bad security habits and outdated

hardware can make their job. Luckily, a

little planning and the right tools go a

long way to keeping your information,

people, and assets safe in a world of

nonstop connectivity and complexity.

Lenovo® ThinkPad® and ThinkCentre®

X1 products are powered and protected

by Intel® processors designed to

deliver leading-edge security for an

unwired workplace. This includes

critical management tools like vPro™

and innovative chip-level defenses

including Intel Identity Protection

Technology, Advanced Encryption

Standard New Instructions, and

Trusted Execution Technology.

To learn more about how Lenovo ThinkPad and ThinkCentre X1 can unlock a brand new future of work, visit www.lenovo.com/think.

© 2015 Lenovo. All rights reserved. Lenovo is a trademark of Lenovo in the United States, other countries, or both. Intel, the Intel logo, and Intel Inside are trademarks of Intel Corporation in the U.S. and/or other countries. All other trademarks are the property of their respective owners. Version 1.00, November 2015.

Sponsored by Lenovo and Intel®