Business Solutions for Fall 2018

FALL 2018 3 SOLUTIONS Wi-Fi • Use strong administrative and network access passwords. • Use strong encryption (WPA2 and AES encryption).
 • Use separate Wi-Fi for guests.
 • Choose physically secureWi-Fi equipment. Virtual Private Network (VPN) • Use strong passwords, authentication, and encryption. • Limit access to those with valid business need.
 • Provide strong antivirus protection to users. Routers and Switches • Use a network monitoring app to scan for unwanted users. • Restrict remote administrative management.
 • Keep firmware updated. • Use strong passwords. USBs • Scan USBs and other external devices for viruses and malware when connected. • Only pre-approved USBs allowed in company devices.
 • Educate users about USB risks. Social Networking • Create page manager policies and roles. • Limit administrative access.
 • Require two-factor authentication.
 Website • Keep software up to date.
 • Require users to create strong passwords to access.
 • Prevent direct access to upload files to site.
 • Use scan tools to test your site’s security—many are free.
 • Register sites with similar spelling to yours.
 • Run most current versions of content management systems or require web administrator/hosts to do the same. Mobile Devices • Keep a clean machine: Update security software on all devices.
 • Delete unneeded apps.
 • Secure devices with passcodes or other strong authentication such as a finger swipe and keep physically safe.
 • Encrypt sensitive data on all devices.
 • Make sure “find device” and “remote wipe” are activated. Email • When in doubt, throw it out: Educate employees about remaining alert to suspicious email. • Provide all email recipients with an option to opt off your distribution list.
 • Require long, strong, and unique passwords on work accounts.
 • Get two steps ahead: Turn on two-factor authentication. File Sharing • Restrict the locations to which work files containing sensitive information can be saved or copied. • If possible, use application-level encryption to protect the information in your files. • Use file-naming conventions that are less likely to disclose the types of information a file contains. • Monitor networks for sensitive information, either directly or by using a third-party service provider. • Free services do not provide the legal protection appropriate for business. The National Cyber Security Alliance (NCSA) builds strong public/private partnerships to educate users with the information they need to keep themselves, their organizations, their systems, and their sensitive information safe and secure online. This NCSA technology checklist is a quick way for your business to identify any security issues that need addressing. Check Out This Technology Checklist To learn more from the NCSA, visit https://staysafeonline.org. Contact Panora Telco or Guthrie Center Communications if you have internet security questions.

RkJQdWJsaXNoZXIy MTMzNDE=