Apply all known fixes to your systems and install a firewall. The next few steps may be:
- Install intrusion detection devices and,
- Perform an ethical attack (e.g. war dialing) on your system to find vulnerabilities.
Baseline -- develop a sound security policy, implement it and enforce it.
Editor's note: Do you agree with this expert's response? If you have more to share, post it in one of our .bphAaR2qhqA^0@/searchstorage>discussion forums.
This was first published in October 2002