Compare cert salaries and plan your next career move
Another top priority among two-thirds of businesses is mobility, which is more nascent than security. There is now more demand for flexibility among end users, who don’t want to be limited to using a BlackBerry or other standardized devices. “Because it has happened so quickly, many organizations and their IT staff are still catching up to understand the technology and make sure they strike the right balance between protecting the technology and giving flexibility for devices to be used,” Herbert said. Because bring-your-own-device BYOD is such a new model, businesses are having trouble keeping up with emerging security concerns on the mobile platform as well, according to Hebert. “From the security standpoint, there are increasing concerns about mobile malware and data loss. There are not that many companies yet that have full-blown mobile device management (MDM) applications and processes in place,” Herbert said, citing tools like remote wiping as one way to protect corporate info on any device.
erpadmin wrote: » If you're in a organizational culture where your users dictate IT security policy, good luck with that. I don't think there's a IT skills gap where security is concerned....I think part of it is IT laziness when it comes to governance (seriously, how many shops out there have users with local admin rights on their boxes?)
erpadmin wrote: » The phone deal is going to be quite a different story. I would personally be in favor of having folks go to a IT person (be it a help desk person or an exchange admin) and having that person inspect the personal smartphone before allowing it to access the network for email/VPN. Then have users sign something that states if the phone is lost, the organization can wipe the phone without any hesitation. Truth is, I don't see that happening, in part because of laziness. I know a good number of good shops will does this....but not many.
erpadmin wrote: » I don't think there's a IT skills gap where security is concerned....I think part of it is IT laziness when it comes to governance (seriously, how many shops out there have users with local admin rights on their boxes?)
TheCudder wrote: » I provide desktop support for a large & very well known fortune 500 company that gives its users local administrative right to their systems.
buzzkill wrote: » And good for them I say. I'd imagine that the number of help desk hours that saves by not having to assist users install legit apps outweighs the time spent spent fixing problems caused by them running as admin users.
higherho wrote: » There's ways around this. For example; ePO (MCafee product) can prevent unauthorized installed and only approved software can be installed on your machine. Of course you would need someone to create these polices and maintain the ePO. Either way I think giving local admin rights is just bad in general.
erpadmin wrote: » Heck, even a properly configured Windows Domain with GPOs can do that, sans McAfee's EPO (which my shop uses just to push out the antivirus throughout the domain)
.....but that just goes back to my point about governance.....and laziness. Helpdesks in many organizations don't want to deal with IT security, so they let the users do whatever they want...whether these are at Fortune 500 shops or public sector shops. Whereas I've seen shops from both sectors that are very strict on IT security.
I'll say this though, even Darril Gibson wrote that IT Security is useless if it impedes business. At the same time, if you have a broken lock, you don't fix that by removing the door.
higherho wrote: » I think you should lock down the box as much as you can but your application should also be secured / locked down (Most databases I see use SQL authentication versus Windows authentication which is a big mistake in certain circumstances).
erpadmin wrote: » Ummm...I don't see why Windows authentication would be less secure than SQL authentication. The only difference between the two is that Windows authentication allows you access to the database with your domain credentials. However, even then, the DB security still gets applied based on who holds those credentials.
For example, I have my ERP developers have access to our production databases only so that they can perform queries against it. They only have read only access and they use their Windows authentication login. The developer databases, they have read and write access (otherwise, they can't do their jobs.) But where production is concerned, I wouldn't be doing my job if they had read and write access to production. They don't have admin rights to the server either (in fact, it's obviously not required.)
The only time I deal with SQL authentication (aside from the sa account) is if I have to create an application user that an application will need to have rights to the database. Other than that, Windows Authentication is pretty much all right.
erpadmin wrote: » That makes sense if you're using multiple domains. Sounds like your SQL Servers are in one domain, and your users are in another. When my SQL Servers were on 2000, we had mixed authentication as well. When we went to 2005/2008 (2005 was brief....but it had to be done because 2008 R2 was not yet certified. However the upgrade from 2K5 to 2K8 R2 was relatively painless.) we went the windows authentication model for both security and simplicity (doing a DB refresh meant recreating user logins...not cool.) Once a refresh was done, I'd give the developers their write access and call it a day.
Database Administration should be something you might want to look into. Compared to Cisco/Microsoft admins, they are not a dime a dozen. Plus, with an optional programming language under your belt (just enough to know what's going on...), you might find that you'll like both the work and pay.
techdudehere wrote: » not locking down firewall rules, wide open terminal servers
Compare salaries for top cybersecurity certifications. Free download for TechExams community.