Create a Simple Security Regimen

So where do you begin? First, sit down with your customers to understand the risks they face and their security needs. You'll want to identify systems, networks, Internet links and security components already in use, taking inventory of the components that will need regular attention and occasional patches or updates, such as operating systems, firewalls and antivirus software. Don't forget to ask about laptops and work-at-home systems. Next, scan your clients' systems and networks, starting from the periphery and working your way in to internal networks. Document everything you find, particularly results where remediation is required or suggested. Also, note patches, fixes or service packs that need to be applied. Rank them by priority.

Now it's time to create a customer report in which you describe the current state of security and all urgent vulnerabilities. Then provide a remediation plan, which should include a budget to cover related labor, plus any necessary hardware and software costs. If you need to perform a risk assessment to justify expenses, now's the time to do so.

At this point, it's time to move on to regular maintenance and emergency responses. Here's what to do, step-by-step.

In general, providing security is an excellent business for systems builders. It requires regular, frequent meetings with your customers, which can lead to additional work. Make sure you understand your customers' growth and expansion plans, if only to ensure that new additions to their networks and systems meet security requirements.

id
unit-1659132512259
type
Sponsored post

You may also consider offering your services to help with planned system additions, upgrades and migrations. That makes it much easier for you to keep your inventory and configuration data completely up-to-date. It also ensures that security is an integral part of your clients' processes and activities. And that's good business for the both of you.

Ed Tittel is a consultant who specializes in IT certification and information security.