Use Strong Passwords; Write Them Down or Use an Encrypted Password Database. Consider Using Two-Factor Authentication Instead of Passwords.  
  Use Anti-Virus and Anti-Spyware Software.  
  Protect Against Internet Intrusions.  
  Regularly Check For and Apply Security Updates.  
  Routinely Back Up Your Data, and Verify You Can Restore From the Backup.  
  Apply Common Sense When Dealing with E-mail.  
  Be Aware of the Risks of File-Sharing.  
  Routinely Check for Suspicious Activity.  
  Educate Your Employees About Your Security and Acceptable Use Policies.  
  Develop and Continually Refine a Disaster Recovery / Business Continuity Plan.  
  Limit Access to Sensitive and Confidential Data.  
Home About Me Contact Support BLive To Me! Monthly Specials
 
 



Educate Your Employees About Your Security and Acceptable Use Policies.


Why bother doing this?  Security is not a "thing" that can be imposed from above: it is the shared responsibility of everyone in your company.  Security, like the proverbial chain, is only as strong as its' weakest link: it only takes one person ignoring your security or acceptable use policies to create a hole in your defenses.



Effective administrative procedures establish defined, repeatable, and workable processes that ensure everyone in the organization assists in securing your network and the sensitive information it holds.

   The Information Systems Security Association's Human Firewall Council has coined the term Human Firewall and defines it as "a phrase acknowledging the fact that information security critically depends on people at all levels of an organization in order to be effective. The Human Firewall recognizes that the support of each and every worker who comes in contact with sensitive, valuable or critical information is essential for effective information security."


A well-written Acceptable Use Policy focuses on responsible use of computer networks, including the Internet.

   The purpose of such a policy is to outline the acceptable use of computer equipment within the company, to reinforce that the rules are in place to protect the employee and the company, and to remind people that inappropriate use exposes the company to risks including virus attacks, compromise of network systems and services, and legal issues.



Make sure your employees and/or family members know what to do if your computers become infected by malicious software. [Click here for further guidance.]

Next...

top

 
  Copyright 2005 Duke InfoSecurity & InfoTechnology Services. All rights reserved
PRIVACY POLICY                    Terms of Services & Legal Notices