Blogs and Posts

Business Cyber Security Checklist
- By: Garry Feldman
- Date: September 21, 2016
Is your business network secure? There are certain things that you should have in place to make sure that you have all of the basics covered. Use our Cyber Security Checklist to ensure that you are covering the essentials for safety within your business network, developed by IT support and services professionals.
Firewall
Whether it’s an appliance or a server you need to protect your network from the outside world, your firewall is the front line of defense against hackers.
Complex Passwords
Passwords are the everyday keys into your network locks. If they are easy to guess or hack, then your security is compromised. Make sure to utilize complex passwords as a part of your security plan.
Independent User Names
In order to have the option of guessing a password, hackers must have a user account to use it against. If your user names are unique and independent it makes it harder for them to find a way in. Use independent logins to keep your network more secure.
Antivirus Software
Viruses have gotten more complex and now include a nasty class of programs called malware. Make sure that your antivirus software is up to date with the most recent virus and malware definitions.
Security Patches
Your operating systems and software may have inherent vulnerabilities. Developers work hard to patch these as soon as they are found. That is why it is imperative that you keep all of the software on your network up to date.
Secure Wi-Fi
Do you have a Wi-Fi network in your office? If you do then you should also have a complex and rotating password on it. You may want to consider adding device level security, as well. Wi-Fi networks are a quick and easy way for intruders to find their way in.
Employee Training
Employees are your front line of defense against hackers and intruders. Your employees should be trained to recognize common methods that hackers use, like phishing scams or social engineering.
Develop a BYoD Plan
Employees want to use their own devices on your network. Make sure you know how to plan on handling employee devices, what types of devices are not allowed and what you will do as new devices become available.
Think About Encryption
A great way to keep your communications safe is to use encryption. Sensitive data should be stored and transmitted in encrypted form. This is very important for users of mobile devices. Encryption can prevent important data from leaving stolen devices and falling into the wrong hands.
Audits and Drills
How do you know your plan is working? By auditing it as it works and practicing it with drills. Schedule regular audits of your plan and run drills or tests to ensure that what you have in place can handle what is being thrown at it.
Have Adequate IT Support and Services
Do you have a fully-staffed and functional IT support and services department to help you in times of trouble and maintain regular security checks? If not, then U.S. Computer Connection may be able to help. Contact us today!
White Papers
-
Ransomware E-book
The Business Guide to Ransomware.
-
IT Move: Soup to Nuts
Take a look for IT Move Project Planning.
Blog Archive
Blog Archives
- June 2019 (1)
- May 2019 (1)
- April 2019 (1)
- December 2018 (1)
- November 2018 (1)
- September 2018 (1)
- August 2018 (4)
- July 2018 (5)
- June 2018 (7)
- May 2018 (5)
- April 2018 (5)
- March 2018 (5)
- February 2018 (4)
- January 2018 (5)
- December 2017 (6)
- November 2017 (5)
- October 2017 (6)
- September 2017 (6)
- August 2017 (4)
- July 2017 (4)
- June 2017 (6)
- May 2017 (4)
- April 2017 (6)
- March 2017 (4)
- February 2017 (5)
- January 2017 (5)
- December 2016 (5)
- November 2016 (5)
- October 2016 (4)
- September 2016 (6)
- August 2016 (4)
- July 2016 (7)
- June 2016 (7)
- May 2016 (6)
- April 2016 (5)
- March 2016 (7)
- February 2016 (5)
- January 2016 (5)
- December 2015 (6)
- November 2015 (1)
- October 2015 (2)
- August 2015 (5)
Categories
- Backup and Disaster Recovery (12)
- Business IT (73)
- Security (5)
- Security Tips (71)
- Training (35)
- Uncategorized (5)
- Webinar (28)