Business Solutions for Summer 2019

S U MM E R 2 0 1 9 3 BUSINESS solutions Check Out This Technology Checklist Wi-Fi • Use strong administrative and network access passwords. • Use strong encryption (WPA2 and AES encryption). • Use separate Wi-Fi for guests. • Physically secure Wi-Fi equipment. Virtual Private Network (VPN) • Use strong passwords, authentication, and encryption. • Limit access to those with valid business need. • Provide strong antivirus protection to users. Routers and Switches • Use a network monitoring app to scan for unwanted users. • Restrict remote administrative management. • Keep firmware updated. • Use strong passwords. USBs • Scan USBs and other external devices for viruses and malware when connected. • Only pre-approved USBs allowed in company devices. • Educate users about USB risks. Website • Keep software up to date. • Require users to create strong passwords to access. • Prevent direct access to upload files to site. • Use scan tools to test your site’s security—many are free. • Register sites with similar spelling to yours. • Run most current versions of content management systems or require web administrator/hosts to do the same. Mobile Devices • Keep a clean machine: Update security software on all devices. • Delete unneeded apps. • Secure devices with passcodes or other strong authentication such as a finger swipe and keep physically safe. • Encrypt sensitive data on all devices. • Make sure “find device” and “remote wipe” are activated. Email • When in doubt, throw it out: Educate employees about remaining alert to suspicious email. • Provide all email recipients with an option to opt off your distribution list. • Require long, strong, and unique passwords on work accounts. • Get two steps ahead: Turn on two-factor authentication. File Sharing • Restrict the locations to which work files containing sensitive information can be saved or copied. • If possible, use application-level encryption to protect the information in your files. • Use file-naming conventions that are less likely to disclose the types of information a file contains. • Monitor networks for sensitive information, either directly or by using a third-party service provider. • Free services do not provide the legal protection appropriate for business. Social Networking • Create page manager policies and roles. • Limit administrative access. • Require two-factor authentication. The National Cyber Security Alliance (NCSA) builds strong public/private partnerships to educate users with the information they need to keep themselves, their organizations, their systems, and their sensitive information safe and secure online. This NCSA technology checklist is a quick way for your business to identify any security issues that need addressing. To learn more from the NCSA, visit https://staysafeonline.org . For information related to the security of your services fromMadison Communications, call 1-800-422-4848.

RkJQdWJsaXNoZXIy MTMzNDE=