* Cutter Consortium shares 15 actions to consider as part of a responsible computing strategy While most security efforts focus on shoring up your company’s network perimeter to keep the bad guys out, strong policy also entails making sure your computing assets aren’t used to inflict harm on other companies or individuals. Cutter Consortium says the business and security risks associated with an increasingly interconnected society call for increased emphasis on responsible computing. “Once connected to the World Wide Web or the Internet, a company actively occupies a virtual space that is peopled with competitors, terrorists, children, environmentalists, lawyers – every segment of society – or actually, every segment of nearly every society on earth,” says Lynne Ellen, a Cutter Consortium fellow. “Responsible computing strategies account for intended and unintended interactions with such communities.”Cutter shares 15 actions to consider as part of a responsible computing strategy: 1. Establish strong identity management for access to the network. Remember the best authentication includes something you know, something you have, and something you are. Require at least two of these things. 2. Strictly control password management and administration.3. Patch aggressively and strive for a process that allows all desktops to be patched in two days or less. 4. Divide your network into firewall-separated subnets. Carefully control traffic through the firewalls.5. Don’t rely on firewalls as the primary protection.6. Manage all outbound traffic as aggressively as you manage inbound traffic.7. Conduct regular network vulnerability assessments.8. Eliminate modems.9. Secure wireless networks. 10. Deploy intrusion protection devices and methods.11. Deploy thin-client devices where possible because they aren’t vulnerable to infections.12. Carefully manage all interfaces between your company and others. Every contract should stipulate mutual security policies.13. Learn what methods software vendors use to control the insertion of back doors in their products. Require the disclosure of all known back doors. 14. Develop a comprehensive, responsible computing policy, communicate it with employees, and develop methods for enforcement.15. Regularly review security scenarios and establish an emergency response plan.For more information about Cutter Consortium, go to http://www.cutter.com Related content news Dell provides $150M to develop an AI compute cluster for Imbue Helping the startup build an independent system to create foundation models may help solidify Dell’s spot alongside cloud computing giants in the race to power AI. By Elizabeth Montalbano Nov 29, 2023 4 mins Generative AI Machine Learning Artificial Intelligence news DRAM prices slide as the semiconductor industry starts to decline TSMC is reported to be cutting production runs on its mature process nodes as a glut of older chips in the market is putting downward pricing pressure on DDR4. By Sam Reynolds Nov 29, 2023 3 mins Flash Storage Technology Industry news analysis Cisco, AWS strengthen ties between cloud-management products Combining insights from Cisco ThousandEyes and AWS into a single view can dramatically reduce problem identification and resolution time, the vendors say. By Michael Cooney Nov 28, 2023 4 mins Network Management Software Cloud Computing opinion Is anything useful happening in network management? Enterprises see the potential for AI to benefit network management, but progress so far is limited by AI’s ability to work with company-specific network data and the range of devices that AI can see. By Tom Nolle Nov 28, 2023 7 mins Generative AI Network Management Software Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe