Steps to Secure Data

SecureState –

SecureState President and CEO, Ken Stasiak, discusses current issues in information security in a weekly video. Ken answers Summer's questions and provides viewers with tips to improve their business security program.

In this week's video, Ken discusses the security steps to take in 2010.

  • Determine what type of data you hold
  • Take Inventory of your systems that store, process and transmit data
  • System Flows-Inputs and Outputs
  • Risk Assessment/Gap Analysis
  • Threats, Vulnerabilities and Technologies

Watch previous weeks' State of Security videos.

Insider: How the basic tech behind the Internet works
Join the discussion
Be the first to comment on this article. Our Commenting Policies