Hardly a week goes by without a news report about a stolen laptop or some other security breach. I guess a positive outcome of this news coverage is it has made business and individuals more security conscious. Security is always going to be a balancing act. If your security policy gives you strong protection but is not practical or difficult to understand the risk is that staff won't stick to it. Here are some simple steps to improve the security of your network:
DO
• Implement secure passwords. At least 6 characters with a combination of upper and lower case plus special characters/numbers.
• Ensure passwords are changed in your business every month. This can be set as an automated prompt.
• Ensure you have adequate anti-virus protection and spam filtering.
• Ensure you have a firewall.
• Only allow remote access to people who need it not everyone.
• Implement a laptop security policy and ensure staff are trained on it.
DON'T
• Share passwords within the business. There are still some businesses out there who have book labelled "passwords" on full view in the open plan office!
• Don't let staff write their password reminders on a Post-It Note stuck to their computer.
• Have a link for external access to your internal systems from your public website.
If you are running Microsoft Small Business Server you can implement secure fobs – like some banks so that in order to login remotely you need to know the username/password and be in possession of the fob in order to input a random number. This also available on other server types and systems.
Remember that one of the biggest threats to your security is from within your business.
Wireless Networks
Wireless is not a secure medium and should be treated as such, where possible implement the highest encryption practical. Firewall the wireless so that even if it is compromised only your internet connection is compromised – not your internal systems.
Web surfing - common Sense
Don’t click on links in emails asking you to login to so and so bank or indeed any site, if you believe it is a legitimate email open up internet explorer and browse to the site directly and login without clicking on any links with the email.
Pop-up boxes – if you get a pop-up box saying you need to update so and so anti virus software and you have never heard of the software just close it – clicking on the links gets you to install malware. Another variation of the above is a pop-up saying you are infected with a virus click here to get protection or similar – don’t do it.
Social networking sites (Facebook, Bebo, Myspace etc)
I’m new to social networking sites but I have noticed that it is now possible for viruses and other malicious software to be spread via these sites. A user's login is compromised and then their account is used to send malicious links via the internal email/notification system to all their contacts on that site.
Vigilance is important here and you should take the same precautions used for email, including never responding to unwanted messages and never posting personal information that could lead to identity theft. This includes your birthday in your personal profile. If you want to display it I suggest excluding your year of birth.
Related links
Facebook users hit by virus
Stay safe online - for small businesses
Please contact us for further advice on IT security
It Security - How to Keep Your Assets Safe
Subscribe to:
Post Comments (Atom)
About Me
- VPN.CO.IN
- Your information resource for Virtual Private Networks | Vpn Setup | Cisco Vpn Client | Tunneling | Tunnel | Computer Networking | Secure | Mpls Network | Cisco Vpn | Vpn Network | Wireless Router | Routers | Sonicwall | Remote Access Vpn | Cisco | Router | Firewall | Remote Access | Checkpoint | Safenet at Vpn.co.in
Followers
Powered by Blogger.
Blog Archive
-
▼
2010
(1174)
-
▼
May
(252)
- Grendel Scan @ Defcon
- Opera raises curtains to half a dozen security Flaws
- Hack me if you can : Airtel Iphone
- Red Hat, Fedora Project Network Compromised.
- DirBuster application to brute force hidden direct...
- Open Source Vulnerability Database Mysql Dump
- Campaigns against 7 year old Internet Explorer
- WPA crack with Backtrack 3
- WPA2: The secure way…
- Google Chrome: Beautiful and Vulnerable
- sqlmap – automatic SQL injection tool
- The sniffy project
- VNCcrack – cracker for the VNC challenge protocol
- Metasploit 3.2 is out
- Google uses 21 times more bandwidth than it pays for…
- DNS Multiple Race Exploiter
- Dynamic Port Scanner – reliable spoofed source IP ...
- GPU crack WPA 100 times faster then CPU
- FBI fishing on Asterisk IP PBX vishing
- Xplico: Open source Network Forensic Analysis Tool
- Money for nothing and spam for free…
- Privacy concern over new powers for police to hack...
- Beat the recession with low cost video surveillanc...
- Psycho injection : Injecting ideas into a subconsc...
- The Right To Information ( RTI ) act of INDIA
- Glimpses of tomorrow.. A security obsessed world..?
- WPA crack with Slitaz Aircrack-ng Distribution
- US Defense Funds $4 million on telepathy project c...
- Gang Stalking: Is it a new age mantra of disgruntl...
- Evolution: Psychotronic weapons, Remote viewing : ...
- Twitter Red Carpet Era
- A solution for Google in China
- Reverse lo-jack incident
- Re-learning old lessons in the cloud
- Response to Rockefeller-Snowe: new regulations wil...
- Is China testing cyber-nukes?
- Look to how the Cold War was won, not how it was m...
- Carl Levin poses three cyber scenarios
- Seven Cyber Scenarios that should keep you up at n...
- Cybersecurity Act of 2010 is a bad bill
- The Advantages of a VPN
- What About VPN Security?
- What Is VPN Encryption?
- Introduction to FreeS/WAN
- Introduction to MPLS .. Explaining Multi-protocol ...
- (VPN) Virtual Private Network FAQs
- VeriSign Builds Two-Factor Authentication Into New...
- NTT Further Expands US Presence, Linking Denver to...
- NTT to Establish Global IP-VPN POP in India and En...
- NTT Com to Open New Chinese Office in Wuhan and PO...
- Bahrain Telecommunications Company B.S.C - Financi...
- 642-825 practice test
- Why You Need an Expert to Make Your Business Bulle...
- New Wireless Internet Technology For Mobile Profes...
- Remote service solutions
- 000-206 actual answer
- OPT-E-MAN- Why You Should Make the Switch
- Remote Product Services
- Remote Server Backup: Keeping Business Safe
- Comstor to Distribute Cisco Unified Computing Syst...
- How Can Remote Desktop Software Help You?
- 642-691 exam question
- Five Reasons to Choose Windows Server 2008 Hosting
- Remote Pc Repair - Computer Tech Support
- Nokia E66: Fulfilling Your All Professional And Co...
- MPLS VPN - MPLS VPN, Your Secure and Dependable Co...
- Why Is Wireless Technology Is Taking Over How We L...
- OS X Server 10.6 buy cheap
- CCTV Security Systems Chennai India
- 350-018 Exam Resources
- Must-Haves for Enterprise PC Backup Solutions
- Free yourself to do more, while securing your busi...
- Career in Networking Industry
- Best Nokia deals: Enjoy big pool of features with ...
- Corporate Cyber Security: Part Two
- Remote Service platform
- OPTEMAN Connects Several Locations
- Remote Server Backup Advantages
- 000-974 braindumps
- Japan IP VPN Services 2006-2009 Forecast: The Impa...
- How To Unblock Websites With Vpn Worldwide
- ISP BitTorrent restrictions? This should help you
- Defining Remote Computer Technology
- Video Conferencing, E Learning, Network Security S...
- SOLID SYSTEMS DEPLOYS NETSCREEN SECURITY SOLUTIONS...
- What Connectivity Services Are Available
- Anonymous VPN - How to Stay Anonymous Online
- Holding An Online Meeting With Remote Pc Access So...
- The Benefits of IP Telephony For Your Business
- Protect Files with Offsite Storage
- Cisco 642-566 exam
- Cisco IPSec VPN Services Module - Encryption module
- Vodafone Global Enterprise - Secure Remote Access
- 642-825 Study Guide
- Using Inflight Internet for Wi-Fi Access
- Why Office Space Has Changed for the Best!
- Starting a True Online Business
- New Technologies Make Security Cameras More Powerf...
- Computer Repair Services in Los Angeles Help Busin...
- Dvrs Providing Security and Surveillance in Your H...
-
▼
May
(252)
0 comments:
Post a Comment