yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Computing
Conference & Expo
November 2-4, 2009 NYC
Register Today and SAVE !..

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
In many cases, the end of the year gives you time to step back and take stock of the last 12 months. This is when many of us take a hard look at what worked and what did not, complete performance reviews, and formulate plans for the coming year. For me, it is all of those things plus a time when I u...
Top Mistakes That Leave SMBs Vulnerable
Even the smallest of businesses can generate a huge volume of emails, payment information and other data that must be protected

Today even the smallest of businesses can generate a huge volume of emails, payment information and other data that must be protected. Medical practices, credit unions and independent retailers all face HIPAA, PCI and other standards. With so many regulations and limited budgets, how can small businesses keep up? Here are the top security mistakes that leave SMBs vulnerable to breaches and compliance audits.

Ignoring Blind Spots
In small businesses, technical expertise is generally not deep - rather, the folks in charge of protecting data are often performing other job functions in the company. If your staff lacks expertise in a given area, it is important to invest in a regular health check with subject matter experts to ensure each solution you have in place continues to remain optimally configured, and operating at peak performance.

Thinking Your Size Makes You Immune
Many small companies believe their size means they are immune to break-ins, stolen IP or other issues, or they feel only bigger organizations will be targeted. This leads to a piece-meal security portfolio being put together with cheap point solutions, freeware and no way to consolidate the information. Don't think it won't happen to you - always take precautions and take threats seriously.

Not Checking Your Work
Just as a writer's work is reviewed by an editor, your work may benefit from a second perspective. In one instance, an administrator at an oil and gas company manually input a policy that included a typo. This left a huge hole, which was open and susceptible to attack. Having your work reviewed by a second set of eyes, be it a colleague or a consultant, can help avoid simple errors and protect your business.

Viewing Compliance as a "Checkbox"
HIPAA, PCI, FISMA and others are not just points to cross off your list. To get out ahead of audit findings, implement industry best practices such as CIS, SANS or even MS Hardening Guidelines. Nothing ruins your week like tracking down lost data or tracking down a root cause, so embrace a security mindset and view it as a responsibility, not a chore.

Not Enforcing an Employee Security Policy
Few small businesses enforce security policies on their employees. In any business, employees are likely storing customer data, whether they are aware of it or not. A stolen laptop, lost smartphone or even a prying eye can lead to the wrong people obtaining your IP or customer data without your knowledge. Create a policy if you do not have one currently, and enforce it on all employees.

Ignoring Staff Education
Whether your staff comes to you with a strong security background or is forced to "learn on the fly," a lack of training can lead to avoidable incidents. No matter their prior knowledge, make sure your IT staff receives training about the products they work with and provide time and financial resources to help keep them up to date. Personnel training can provide a large ROI, and helps avoid incidents that could damage your business and reputation.

Using the Same Passwords Again and Again
Every company, small or large, should strive to have some guidelines and standard operating procedures around the use (and re-use) of passwords. In order to mitigate the risk of successful password guessing and cracking in their environment, employees should be aware of the issues that may stem from the use and reuse of weak passwords. Put a password manager such as Last Pass, Keepass, or Roboform in place to generate random passwords for each new account that is created and to keep track of them. Change passwords for critical resources every 90-180 days, and enforce rules of complexity such as a minimum number of characters and alphanumeric rules.

Letting Anyone on Your Network
Clients, vendors and other visitors may request access, but allowing non-secured personal or third-party computers to connect to your LAN can be a big mistake. Make sure any and every computer on your network is secure; you never know if a client's laptop is carrying a virus.

About Sarah Isaacs
An expert in antivirus theory and technology, Sarah (Merrion) Isaacs serves as Conventus’ Chief Executive Officer as well as the company’s Chief Operations Officer. She co-founded Conventus in 2006 after working as a Technical Manager for the central region at Symantec where she consulted on the implementation of antivirus and client security technology products for numerous corporate and government enterprises. In this role, she was an invaluable resource for 17 traveling and on-site consultants — providing guidance and professional development opportunities. Prior to this role, she served as a Principal Security Consultant at Symantec.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1

SOA World Latest Stories
We call it DevOps but much of the time there’s a lot more discussion about the needs and concerns of developers than there is about other groups. There’s a focus on improved and less isolated developer workflows. There are many discussions around collaboration, continuous integration a...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is founda...
The dynamic nature of the cloud means that change is a constant when it comes to modern cloud-based infrastructure. Delivering modern applications to end users, therefore, is a constantly shifting challenge. Delivery automation helps IT Ops teams ensure that apps are providing an optim...
"We started a Master of Science in business analytics - that's the hot topic. We serve the business community around San Francisco so we educate the working professionals and this is where they all want to be," explained Judy Lee, Associate Professor and Department Chair at Golden Gate...
There is a huge demand for responsive, real-time mobile and web experiences, but current architectural patterns do not easily accommodate applications that respond to events in real time. Common solutions using message queues or HTTP long-polling quickly lead to resiliency, scalability...
"CA has been doing a lot of things in the area of DevOps. Now we have a complete set of tool sets in order to enable customers to go all the way from planning to development to testing down to release into the operations," explained Aruna Ravichandran, Vice President of Global Marketin...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers