Business Solutions for Fall 2018
FALL 2018 3 SOLUTIONS Wi-Fi • Use strong administrative and network access passwords. • Use strong encryption (WPA2 and AES encryption).
• Use separate Wi-Fi for guests.
• Choose physically secureWi-Fi equipment. Virtual Private Network (VPN) • Use strong passwords, authentication, and encryption. • Limit access to those with valid business need.
• Provide strong antivirus protection to users. Routers and Switches • Use a network monitoring app to scan for unwanted users. • Restrict remote administrative management.
• Keep firmware updated. • Use strong passwords. USBs • Scan USBs and other external devices for viruses and malware when connected. • Only pre-approved USBs allowed in company devices.
• Educate users about USB risks. Social Networking • Create page manager policies and roles. • Limit administrative access.
• Require two-factor authentication.
Website • Keep software up to date.
• Require users to create strong passwords to access.
• Prevent direct access to upload files to site.
• Use scan tools to test your site’s security—many are free.
• Register sites with similar spelling to yours.
• Run most current versions of content management systems or require web administrator/hosts to do the same. Mobile Devices • Keep a clean machine: Update security software on all devices.
• Delete unneeded apps.
• Secure devices with passcodes or other strong authentication such as a finger swipe and keep physically safe.
• Encrypt sensitive data on all devices.
• Make sure “find device” and “remote wipe” are activated. Email • When in doubt, throw it out: Educate employees about remaining alert to suspicious email. • Provide all email recipients with an option to opt off your distribution list.
• Require long, strong, and unique passwords on work accounts.
• Get two steps ahead: Turn on two-factor authentication. File Sharing • Restrict the locations to which work files containing sensitive information can be saved or copied. • If possible, use application-level encryption to protect the information in your files. • Use file-naming conventions that are less likely to disclose the types of information a file contains. • Monitor networks for sensitive information, either directly or by using a third-party service provider. • Free services do not provide the legal protection appropriate for business. The National Cyber Security Alliance (NCSA) builds strong public/private partnerships to educate users with the information they need to keep themselves, their organizations, their systems, and their sensitive information safe and secure online. This NCSA technology checklist is a quick way for your business to identify any security issues that need addressing. Check Out This Technology Checklist To learn more from the NCSA, visit https://staysafeonline.org. Contact Panora Telco or Guthrie Center Communications if you have internet security questions.
Made with FlippingBook
RkJQdWJsaXNoZXIy MTMzNDE=