SHARE
Facebook X Pinterest WhatsApp

6 IT Security Strategies for 2009

6 IT Security Strategies for 2009 Spammers and cybercriminals are working harder than ever to develop ever-sneakier ways to launch an attack. In anticipation of a 2009 filled with increasingly sophisticated threats from spammers, here are some top strategies IT and security pros can use to thwart the bad guys, compiled from security experts from […]

Feb 11, 2009
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

16 IT Security Strategies for 2009

Spammers and cybercriminals are working harder than ever to develop ever-sneakier ways to launch an attack. In anticipation of a 2009 filled with increasingly sophisticated threats from spammers, here are some top strategies IT and security pros can use to thwart the bad guys, compiled from security experts from MXLogic, Websense and Bell Micro.

2No Title

Rather than rely on any single piece of anti-spam and anti-virus solution or technology, deploy multiple layers of security throughout the organization. Gateway firewalls and antivirus software alone cannot protect against the complex malicious code that threatens the IT infrastructure. Firewalls can detect web traffic, but most have no means of monitoring the specific information being transferred. Antivirus solutions are reactive, not preventive; they are effective only against very specific threats, and they provide even this limited protection only after an attack has already occurred. Organizations need a solution that complements firewalls and antivirus solutions with content-level protection.

3No Title

As malicious attacks become more dynamic, it will become increasingly important to stay current on security updates and patches. Consider implementing a managed security service, which is constantly monitored or updated by a third-party.

4No Title

The weakest security link of any organization remains the end user. While IT and employee training budgets are likely to be tight this year, remember that an ounce of prevention is worth a pound of cure. Hackers can use vulnerabilities in web browsers to inject phony content – such as their own credit card-stealing form – into a frame of an actual trusted website. Users visit what they believe to be a trusted site, such as an online bank or an e-commerce site, and while the image they see looks valid, it is, in fact, a sham, and they are now vulnerable to hackers working in the background.

5No Title

With today’s mobile workforce and the explosive growth of mobile devices, the notion of a protecting the network perimeter is all but dead. Reinforce this idea with end-users and upper management by eliminating this idea all together.

6No Title

While many internal threats aren’t malicious, breaches due to loss, theft or employees accessing inappropriate content are a constant danger. Make sure your employees are aware of new viruses, phishing and identity theft scams, and that they are creating and using strong passwords and protection techniques.

7No Title

It’s easy to focus on cost cutting by doing it yourself, but you may be paying more in the end. Modern managed services like e-mail or Internet security or archiving not only lower overall capital costs, but may be more effective as they’re monitored and maintained 24×7 by someone else.

Recommended for you...

Barracuda Threat Analysis: Sophisticated Phishing on the Rise
Luis Millares
Sep 4, 2025
AI Agents Expose New Cybersecurity Risks, Radware Warns
Franklin Okeke
Sep 4, 2025
Westcon-Comstor Partners With 1Password to Close Access-Trust Gap
Luis Millares
Sep 3, 2025
Sophos Bundles Endpoint Protection Into Taegis MDR and XDR
Franklin Okeke
Sep 3, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.