Security Controls

Security Controls

Security Controls Jonathan Poland

IT security controls are measures that are implemented in order to reduce security risks. These controls may be identified through security audits or as part of projects and continuous improvement efforts. They can be implemented as a matter of process, procedure, or automation, and are designed to protect against potential security threats or vulnerabilities.

There are many different types of IT security controls that can be implemented, including technical controls such as firewalls and antivirus software, as well as administrative controls such as security policies and employee training programs. These controls are often tailored to the specific needs and risks of an organization, and may be adjusted over time as the security landscape evolves.

Effective IT security controls are essential for protecting an organization’s assets, including sensitive data, systems, and networks. They can help to prevent data breaches, cyber attacks, and other security incidents, and are an important part of any organization’s overall risk management strategy. It is important to regularly review and update IT security controls in order to ensure that they are effective and aligned with the changing needs of the organization. The following are illustrative examples of IT security controls.

Authentication

Employees are required to pass multi factor authentication before gaining access to offices.

Audit Trail

A web server records IP addresses and URLs for each access and retains such information for a period of time as an audit trail.

Training

Employees are trained in defensing computing on an annual basis.

Peer Review

Design changes to a critical system require a secure code review.

Communication

Employees are prohibited from attaching documents to internal emails as they can easily be misaddressed. Instead, employees send a link to a document management system that offers authentication and authorization.

Incident Management

Any employee who loses an electronic device that has been used for work is required to report an incident immediately.

Cryptography

Data in storage is encrypted on all devices.

Passwords

Systems perform validation to ensure employees choose strong passwords.

Processes

An IT governance process reviews security incidents on a monthly basis.

Automation

A website places a three hour freeze on a customer’s account if they get their password wrong five times. This dramatically reduces the potential for brute force attacks.

Configuration Management

Changes to firewall rules require an approved change request.

Security Testing

Major system software releases are required to undergo security testing.

Learn More
Waste is Food Jonathan Poland

Waste is Food

The concept of “waste is food” is based on the idea that an industrial economy should not produce any waste except for biological nutrients that can be safely returned to the environment.

Internal Communication Jonathan Poland

Internal Communication

Internal communication is the exchange of information within an organization that is designed to help it achieve its goals. This…

Sales Activities Jonathan Poland

Sales Activities

A sales activity is any action or task that a salesperson undertakes in order to achieve revenue. This can include…

What is a Business Case? Jonathan Poland

What is a Business Case?

A business case is a document that presents a proposal for a project, strategy, or course of action. It is…

Lobbying Jonathan Poland

Lobbying

Vertical integration is when a single company owns multiple levels or all of its supply chain.

Disruption Strategy Jonathan Poland

Disruption Strategy

A distribution strategy outlines how a company plans to make its products or services available to customers. This includes not…

Labor Productivity Jonathan Poland

Labor Productivity

Labor productivity is a measure of the efficiency with which labor is used to produce goods and services. It is…

Brand Loyalty Jonathan Poland

Brand Loyalty

Brand loyalty refers to the degree to which a consumer consistently prefers one brand over others in a particular product…

Customer Relationships Jonathan Poland

Customer Relationships

Customer relationships refer to the interactions between a business and its potential, current, and former customers. These interactions can take…

Search →

Key Bridge

People. Profit. Progress.

Business is the lifeblood of progress and you are the driving force regardless of where you fit in the value chain. People drive profit by bringing useful products and services to market. Profit drives progress by allowing the best ideas to emerge and the best investments to win.

This is the cycle of capital that moves the world forward and that’s why I started Key Bridge, a private membership for the pursuit of profit and progress; a platform for building better assets, tackling global challenges, and advancing the greater good.

Key Bridge

People. Profit. Progress.

Business is the lifeblood of progress and you are the driving force regardless of where you fit in the value chain. People drive profit by bringing useful products and services to market. Profit drives progress by allowing the best ideas to emerge and the best investments to win.

This is the cycle of capital that moves the world forward and that’s why I started Key Bridge, a private membership for the pursuit of profit and progress; a platform for building better assets, tackling global challenges, and advancing the greater good.