Information Security
Information security is all about protecting information (and by implication, information systems) against unauthorized (or unintentional) access, use, disclosure, disruption, corruption, modification, duplication or destruction. An important component of information security is “information assurance”, which is concerned with maintaining the confidentiality, integrity and availability of information.
Information Security Defenses
- Access control
- Application security
- Antivirus software
- Secure coding
- Security by design
- Secure operating systems
- Authentication
- Multi-factor authentication
- Two-factor authentication
- Authorization
- Data-centric security
- Firewall (computing)
- Intrusion detection system
- Intrusion prevention system
- Mobile secure gateway
Information security involves protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction, and it is concerned with maintaining the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms. Our information security consultants will work with you to secure your information and information systems and to develop dynamic, proactive, cost-effective information security policies and practices. Below you will find a very basic information security checklist that will give you an idea of the bare minimum that one should implement in order to provide a reasonable measure of information security. If your organization does not have these measures in place then feel free to contact us for no-obligations advice about getting started with information security.