Blogs and Posts

blog

Business Cyber Security Checklist

  • By: Garry Feldman
  • Date: September 21, 2016

Is your business network secure? There are certain things that you should have in place to make sure that you have all of the basics covered. Use our Cyber Security Checklist to ensure that you are covering the essentials for safety within your business network, developed by IT support and services professionals.

Firewall

Whether it’s an appliance or a server you need to protect your network from the outside world, your firewall is the front line of defense against hackers.

Complex Passwords

Passwords are the everyday keys into your network locks. If they are easy to guess or hack, then your security is compromised. Make sure to utilize complex passwords as a part of your security plan.

Independent User Names

In order to have the option of guessing a password, hackers must have a user account to use it against. If your user names are unique and independent it makes it harder for them to find a way in. Use independent logins to keep your network more secure.

Antivirus Software

Viruses have gotten more complex and now include a nasty class of programs called malware. Make sure that your antivirus software is up to date with the most recent virus and malware definitions.

Security Patches

Your operating systems and software may have inherent vulnerabilities. Developers work hard to patch these as soon as they are found. That is why it is imperative that you keep all of the software on your network up to date.

Secure Wi-Fi

Do you have a Wi-Fi network in your office? If you do then you should also have a complex and rotating password on it. You may want to consider adding device level security, as well. Wi-Fi networks are a quick and easy way for intruders to find their way in.

Employee Training

Employees are your front line of defense against hackers and intruders. Your employees should be trained to recognize common methods that hackers use, like phishing scams or social engineering.

Develop a BYoD Plan

Employees want to use their own devices on your network. Make sure you know how to plan on handling employee devices, what types of devices are not allowed and what you will do as new devices become available.

Think About Encryption

A great way to keep your communications safe is to use encryption. Sensitive data should be stored and transmitted in encrypted form. This is very important for users of mobile devices. Encryption can prevent important data from leaving stolen devices and falling into the wrong hands.

Audits and Drills

How do you know your plan is working? By auditing it as it works and practicing it with drills. Schedule regular audits of your plan and run drills or tests to ensure that what you have in place can handle what is being thrown at it.

Have Adequate IT Support and Services

Do you have a fully-staffed and functional IT support and services department to help you in times of trouble and maintain regular security checks? If not, then U.S. Computer Connection may be able to help. Contact us today!

White Papers

Blog Archive

Blog Archives
Categories
Newsletter

Connect with USCC