Steps to Secure Data

SecureState |  Security, data security, risk assessment

SecureState President and CEO, Ken Stasiak, discusses current issues in information security in a weekly video. Ken answers Summer's questions and provides viewers with tips to improve their business security program.

In this week's video, Ken discusses the security steps to take in 2010.

  • Determine what type of data you hold
  • Take Inventory of your systems that store, process and transmit data
  • System Flows-Inputs and Outputs
  • Risk Assessment/Gap Analysis
  • Threats, Vulnerabilities and Technologies

Watch previous weeks' State of Security videos.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Ask a Question