Use Strong Passwords; Write Them Down or Use an Encrypted Password Database. Consider Using Two-Factor Authentication Instead of Passwords.  
  Use Anti-Virus and Anti-Spyware Software.  
  Protect Against Internet Intrusions.  
  Regularly Check For and Apply Security Updates.  
  Routinely Back Up Your Data, and Verify You Can Restore From the Backup.  
  Apply Common Sense When Dealing with E-mail.  
  Be Aware of the Risks of File-Sharing.  
  Routinely Check for Suspicious Activity.  
  Educate Your Employees About Your Security and Acceptable Use Policies.  
  Develop and Continually Refine a Disaster Recovery / Business Continuity Plan.  
  Limit Access to Sensitive and Confidential Data.  
Home About Me Contact Support BLive To Me! Monthly Specials
 
 



Limit Access to Sensitive and Confidential Data.


Why bother doing this?  As a result of well-publicized incidents of identity theft on the rise, state and federal government regulations are being introduced which will increasingly affect small businesses.  Years spent developing a good business reputation among your customers can be lost literally overnight as a result of adverse publicity surrounding a security breach at your company. 



Educate employees to use care in sharing sensitive and confidential information electronically.


Data files should only be accessed by individuals who have received specific permission.


When access to sensitive or confidential information cannot be tightly controlled, such as e-mail or a credit card transaction over the Internet, this information can be concealed through a mathematical process called encryption.

Back to Security Checklist...

top

 
  Copyright 2005 Duke InfoSecurity & InfoTechnology Services. All rights reserved
PRIVACY POLICY                    Terms of Services & Legal Notices