A guide for Small & Mid-sized Business

º¸¾È ¿î¿µ °ü¸® >> º¸¾ÈÁ¤Ã¥ 
ÀÛ¼ºÀÚ Á¤Á¾¸í ÀÛ¼ºÀÏÀÚ 2009-12-11
Ãß   Ãµ Á¶È¸¼ö 5992
´Ù¿î·Îµå¼ö 72
ÆÄ   ÀÏ  c006.pdf
»ó¼¼¼³¸í

º¸¾ÈÀÇ °³¿ä SMBÀÇ 30%ÀÌ»óÀÌ ¼¼»óÀÌ °³º®ÇÏÁö ¾Ê´Â ÇÑ °ø°Ý¹ÞÁö ¾ÊÀ» °ÍÀ¸·Î »ý°¢ ÇÏ´Â ÀÌÀ¯ Too small to be targeted Their data is not high-value intellectual property & not sensitive proprietary data ±×·¯³ª, SMB°¡ °ø°Ý ¹Þ±â ½¬¿î ÀÌÀ¯ Homogeneous computing infrastructure; According to Gartner 90% of SMB¡¯s are running Windows 80% are using Outlook and Exchange 70% are using SQL DB Lack the specialized, dedicated, and highly trained security staff A part time responsibility More than 60% of mid-sized business do not have a dedicated security staff More than half don¡¯t know they have attacked ±â¾÷ º¸¾ÈÀ» ±ÔÁ¦ÇÏ´Â ¹ý±Ô Government regulations : HIPAA and GLBA A new law enacted by the state of California, SB1386(July 1, 2003) Protecting the confidential personal data of the customer

ÃßõÇϱâ(µî·ÏµÈ ÀڷḦ Æò°¡ÇØ ÁÖ¼¼¿ä.)
Àû±ØÃßõ  Ãßõ  º¸Åë  Ãßõ¾ÈÇÔ 
  • ¡°
  •  SNS¿¡¼­µµ º¸¾È´º½º¸¦ ¹Þ¾Æº¸¼¼¿ä!! 
  • ¡±
 ÇÏÀÌÁ¨ ÆÄ¿öºñÁî 23³â 11¿ù 16ÀÏ~2024³â 11¿ù 15ÀϱîÁö ¾Æ½ºÆ®·Ð½ÃÅ¥¸®Æ¼ ÆÄ¿öºñÁî 2023³â2¿ù23ÀÏ ½ÃÀÛ À§Áîµð¿£¿¡½º 2018 ³Ý¾Øµå ÆÄ¿öºñÁî ÁøÇà 2020³â1¿ù8ÀÏ ½ÃÀÛ~2021³â 1¿ù8ÀϱîÁö