Andrew R. Hickey ukazuje na problemati?nost této oblasti IT. Zmi?uje n?která doporu?ení, nap?. následující:
- Use effective passwords that are changed every 90 days
- Update antivirus and anti-spyware programs regularly
- Download necessary patches to the operating systems regularly
- Create backups of all important data files
- Encrypt sensitive data
- Have an emergency response plan for mobile and wireless security breaches
- Marry proactive education with proper technology that protects network, mobile and wireless connections both inside and outside the corporate environment. That includes wired and wireless security infrastructure, incorporating VPNs, device and endpoint protection, intrusion detection, admission control and effective management.