A guide for Small & Mid-sized Business

º¸¾È ¿î¿µ °ü¸® >> º¸¾ÈÁ¤Ã¥ 
ÀÛ¼ºÀÚ Á¤Á¾¸í ÀÛ¼ºÀÏÀÚ 2009-12-11
Ãß   Ãµ Á¶È¸¼ö 6271
´Ù¿î·Îµå¼ö 74
ÆÄ   ÀÏ  c006.pdf
»ó¼¼¼³¸í

º¸¾ÈÀÇ °³¿ä SMBÀÇ 30%ÀÌ»óÀÌ ¼¼»óÀÌ °³º®ÇÏÁö ¾Ê´Â ÇÑ °ø°Ý¹ÞÁö ¾ÊÀ» °ÍÀ¸·Î »ý°¢ ÇÏ´Â ÀÌÀ¯ Too small to be targeted Their data is not high-value intellectual property & not sensitive proprietary data ±×·¯³ª, SMB°¡ °ø°Ý ¹Þ±â ½¬¿î ÀÌÀ¯ Homogeneous computing infrastructure; According to Gartner 90% of SMB¡¯s are running Windows 80% are using Outlook and Exchange 70% are using SQL DB Lack the specialized, dedicated, and highly trained security staff A part time responsibility More than 60% of mid-sized business do not have a dedicated security staff More than half don¡¯t know they have attacked ±â¾÷ º¸¾ÈÀ» ±ÔÁ¦ÇÏ´Â ¹ý±Ô Government regulations : HIPAA and GLBA A new law enacted by the state of California, SB1386(July 1, 2003) Protecting the confidential personal data of the customer

ÃßõÇϱâ(µî·ÏµÈ ÀڷḦ Æò°¡ÇØ ÁÖ¼¼¿ä.)
Àû±ØÃßõ  Ãßõ  º¸Åë  Ãßõ¾ÈÇÔ 
  • ¡°
  •  SNS¿¡¼­µµ º¸¾È´º½º¸¦ ¹Þ¾Æº¸¼¼¿ä!! 
  • ¡±
2025 º¸¾È½ÃÀå ¹é¼­ À§Áîµð¿£¿¡½º 2018