habits and hardware - SLIDEBLAST.COM

4 downloads 380 Views 123KB Size Report
Secure your information and your business by ... data security, especially on wireless networks. But it is easy to ... d
CHECKLIST

HABITS AND HARDWARE HOW TO BUILD A SMART SECURITY PLATFORM

1. UNDERSTAND YOUR DATA Triage your data, determining the most sensitive and the most at risk then secure accordingly. Experts call it classification, but it’s really just understanding the impact a breach of that data would have on your business — and then choosing controls to apply.

2. ASSESS RISK Everybody is at risk for threats to data security, especially on wireless networks. But it is easy to evaluate the risk through a few questions: Are you using public Wi-Fi? How is it secured? Is your browser secure? Is it time for an alternative such as a VPN connection?

Secure your information and your business by balancing people, processes, and products. Use these tips to check or refine your plan.

3. HELP BUILD STRONG PASSWORD HABITS A strong password — one that’s long, and includes a variety of characters can go a long way toward protecting data. But strong passwords can be hard to remember and manage. Try helping by offering a single sign-on solution to make managing them easier.

4. KNOW YOUR ENEMY Would your employees know a phishing attack if they saw one? What about a suspicious phone call asking about account information? Help train your team to spot potential security threats and what to do when they occur.

5. INSIST ON STANDARDS Standards groups work to develop secure computing principles optimized for modern business. Take advantage of systems that are designed with security requirements from organizations like NIST and TCG, built with certified components, and distributed through a secure supply chain.

6. APPLY ADVANCED AUTHENTICATION Two-factor authentication adds an extra step to the login process to make it harder to breach security. Instead of just entering a password, ask users to show identity by answering a question, swiping or scanning a card, or providing biometric identification like a fingerprint.

Sponsored by Lenovo and Intel®

CHECKLIST

YOUR PARTNER IN REAL SECURITY

7. SECURE YOUR DEVICES FROM THE CPU UP

The bad guys are hard at work every day, but with planning and the right tools you can keep your information, people, and assets safe in a world of nonstop connectivity and complexity.

8. KEEP SENSITIVE DATA CONTAINED

Lenovo™ ThinkPad® and ThinkCentre® X1 products are powered and protected by Intel® processors designed to deliver leading-edge security for today’s workplace. This includes critical management tools like vPro™ and innovative chip-level defenses including Intel Identity Protection Technology, Advanced Encryption Standard New Instructions, and Trusted Execution Technology.

New technologies are embedding powerful security capabilities directly into the device’s CPU, giving you the best chance to stay protected. This provides data encryption, identity protection, and even trusted application execution right from the start.

Go beyond the hardware and protect data in secure virtual “containers.” These are encrypted areas of a device where sensitive information can be segregated so that threats aren’t able to access it.

As the world’s No. 1 provider of technology to businesses of all sizes, Lenovo is committed to bringing our very best in supporting you. Driven by thoughtful design, purposeful engineering, and nonstop performance, our ThinkPad and ThinkCentre X1 products, powered by Intel, deliver breakthrough innovation that you can rely on. To learn more about how Lenovo ThinkPad and ThinkCentre X1 can unlock a brand new future of work, visit solutions.lenovo.com.

Sponsored by Lenovo and Intel®

© 2016 Lenovo. All rights reserved. Lenovo is a trademark of Lenovo in the United States, other countries, or both. Intel, the Intel logo, and Intel Inside are trademarks of Intel Corporation in the U.S. and/or other countries. All other trademarks are the property of their respective owners. Version 2.00, March 2016.