Protect your workplace from cyber attacks

shape
shape
shape
shape
shape
shape
shape
shape

Limit Employee Access to Your Data & Information

Limiting access to your valuable company data reduces the chance for human error, which is the number-one information security threat. Employees should only have access to the systems and specific information they need to do their jobs.

If an employee leaves your company, or transfers to a different company location, take protective action immediately, including deleting passwords and accounts from all systems and collecting company ID badges and entry keys.

An ounce of access prevention can equal a pound of protection when it comes to limiting the impact of a disgruntled ex-employee.

Install Surge Protectors & Uninterruptible Power Supplies

Uninterruptible power supplies (UPS) can give you enough battery life and time to save your data in the event of a power disruption. Check to ensure the UPS type and size meets your company’s standards and requirements. 

Every computer and networked device should be plugged into a UPS. For less-sensitive electronics and non-networked equipment, standard surge protectors should suffice. Be sure to test and replace each UPS and surge protector as recommended by the manufacturer.

Secure All Wireless Access Points & Networks

For secure wireless networking, use these router best practices:

  • Change the administrative password on new devices
  • Set the wireless access point so that it does not broadcast its service set identifier (SSID)
  • Set your router to use WiFi Protected Access 2 (WPA-2), with the Advanced Encryption Standard (AES) for encryption
  • Avoid using WEP (Wired-Equivalent Privacy).

 If you provide wireless internet access to your customers or visitors, make sure it is separated from your business network.

Use Encryption for Sensitive Business Information

Use full-disk encryption to protect all your computers, tablets, and smartphones. Save a copy of your encryption password or key in a secure location separate from your stored backups.

Email recipients typically need the same encryption capability in order to decrypt. Never send the password or key in the same email as the encrypted document. Give it to them via phone or some other method.

Leave a Reply

Your email address will not be published.

18 − 9 =