9 Popular IT Security Practices That Don't Work

9 Popular IT Security Practices That Don't Work
The security products and techniques you rely on most aren't keeping you as secure as you think.
Features Aug 14th 2012

When it comes to IT security, FUD (fear, uncertainty, and doubt) is more than just the tool of overhyping vendors hoping to sell their next big thing. It is the reality that seasoned IT security pros live in, thanks in large part to the -- at times gaping -- shortcomings of traditional approaches to securing IT systems and data.

The truth is most common IT security products and techniques don't work as advertised, leaving us far more exposed to malicious code than we know. That's because traditional IT security takes a whack-a-mole approach to threats, leaving us to catch up with the next wave of innovative malware, most of which rolls out in plain view on the Internet.

Until we solve that problem -- that is, when a critical mass of people wants to end this issue -- we will devise, deploy, and depend on security solutions that will never keep us as safe as we need to be, given the daily escalation of malware aimed at compromising our systems and extracting valuable data.

In the vein of forewarned is forearmed, here are 10 common IT security practices and products that are notguarding your systems as well as you think.

Source: Infoworld (US)


What will the CISOs of 2020 look like?

What will the CISOs of 2020 look like?

Chief information security officers (CISOs) are increasingly being stretched between overseeing their company’s information security team and liaising with the board on budget, business strategy and new threats. And with these security heads also contending with a serious skills shortage, compliance and legislation, we look what the role could look like in 2020.