Your company is serious about data security? We hope that the answer is yes, because no company can afford to the law and the legal risks of ignoring a lack of protection is an effective management information program program.An error it is necessary to book a game of data protection. Vulnerability management process, defining the identification, classification, mitigation and resolution of problems with the equipment information system. Gaps can occur in many different places, depending on the IT network, operating system, database, policy implementation, and the staff at the Step Foundation has begun organization.The defined security policy that creates the security status of the organizations that they want. This database defines the general principles that are used in order to provide an efficient, secure and keep critical information assets. Some of the key factors that decide at this stage are the property of their IT resources, technology, risk classification and information security policy, the principles of protection of the flexible mechanisms is to the actual database study, in relation to the desired state of the entire IT environment. This assessment should be by statutory auditors or management information systems, the technology community are carried out. After inspection, all weaknesses identified in a matrix of social resistance are consolidated. Priority is to identify the gap in the next step in this process is the process at best, a special team of security experts, risk assessment and risk management system to create. The integrated team will be better able to assess problems and priorities so that limited resources can use in an organization is to maximize their potential priorities continue to work closely enterprise.The solved then responsible for repairs. It is important to reach agreement on why there is a gap in this process, a lasting solution to reach a temporary solution to be applied. Analysis of the causes is the process used to the “why” to achieve the situation and implement a sustainable fix.Once gap, are treated, it is important to improve working conditions. The continuous monitoring and regular assessment of controls necessary to ensure that changes are implemented, and supported the organization does what is necessary for security. Now, when we learned the basic method, I invite you to the vulnerability management program for businesses against threats to information security to protect explore .