Medusa

8 Network Security Tips For Businesses

New technological advances promise to make 2015 an interesting and profitable year.

<p style&equals;"text-align&colon; justify&semi;">Regardless of how small or large a business is&comma; there will always be malicious people out there who are intent on causing problems&period; If you don’t have the necessary security controls in place to prevent intrusions&comma; you could end up losing everything&comma; here&&num;8217&semi;s 8 tips from Circle IT to help keep your business network secure&period;<&sol;p>&NewLine;<h3 style&equals;"text-align&colon; justify&semi;"><strong>Don’t Place All of your Eggs in One Basket<&sol;strong><&sol;h3>&NewLine;<p style&equals;"text-align&colon; justify&semi;">Everyone has heard of the old adage &OpenCurlyDoubleQuote;don’t place all of your eggs in one basket”&period; This saying is especially true when it comes to network security&period; You should never rely on just one method to secure your network&period; Your network security should contain multiple layers so that if someone or something makes it past one of your defenses&comma; you still have additional security in place to protect your network&period;<&sol;p>&NewLine;<h3 style&equals;"text-align&colon; justify&semi;"><strong>Use Extra Strong Passwords<&sol;strong><&sol;h3>&NewLine;<p style&equals;"text-align&colon; justify&semi;">Most businesses will have heard about the importance of this&comma; but very few actually do it&period; All network devices such as wireless routers&comma; printers and NAS drives must be configured with extra strong passwords&period; This means setting passwords that are at least nine characters long with mixed case letters&comma; numbers and symbols&period; Never use names or words from the dictionary&excl;<&sol;p>&NewLine;<h3 style&equals;"text-align&colon; justify&semi;"><strong>Encrypt All Laptops and Computers<&sol;strong><&sol;h3>&NewLine;<p style&equals;"text-align&colon; justify&semi;">How many times have you heard news stories that involve a stolen laptop that contained masses of sensitive information&quest; The last thing you want is for your sensitive business data to fall into the hands of the wrong people&period; The most effective way to mitigate this risk is to encrypt all of the data on your computers&comma; laptops and mobile devices&period;<&sol;p>&NewLine;<h3 style&equals;"text-align&colon; justify&semi;"><strong>Hide Your Service Set Identifier &lpar;SSID&rpar;<&sol;strong><&sol;h3>&NewLine;<p style&equals;"text-align&colon; justify&semi;">If you have a wireless network&comma; be sure to hide your service set identifier &lpar;SSID&rpar; or at least change its name to something that’s common&period; It’s essential that all wireless routers have obscure ID’s when they are detected by users&period; Rather than using your business name&comma; choose an innocuous name such as &OpenCurlyDoubleQuote;wireless2” or &OpenCurlyDoubleQuote;router3”&period; This will prevent you from giving away any critical information&period; It’s amazing how many businesses use their names as their ID’s&comma; make it incredibly easy for opportunists to find out whose router is where&period;<&sol;p>&NewLine;<h3 style&equals;"text-align&colon; justify&semi;"><strong>Regularly Audit the Open Ports on Your Network<&sol;strong><&sol;h3>&NewLine;<p style&equals;"text-align&colon; justify&semi;">Ports are very similar to doors&period; If you leave them open for long periods of time without shutting them&comma; you will significantly increase the chances of letting uninvited intruders in&period; If ports are left open&comma; worms and Trojans will use them to communicate with unauthorized third-parties&period; This is why it’s so important to regularly audit the open ports and block any ports that are not in use&period;<&sol;p>&NewLine;<h3 style&equals;"text-align&colon; justify&semi;"><strong>Update Software When Prompted<&sol;strong><&sol;h3>&NewLine;<p style&equals;"text-align&colon; justify&semi;">Be sure to update any third party software when you are prompted&comma; and if you are not prompted&comma; check once a month for updates&period; As well as providing new functionality and fixing bugs&comma; these updates will often deliver important security patches&period; It’s also recommended that you install any windows updates when you are prompted&semi; these updates often contain critical security patches&period;<&sol;p>&NewLine;<h3 style&equals;"text-align&colon; justify&semi;"><strong>Disable Remote Administration<&sol;strong><&sol;h3>&NewLine;<p style&equals;"text-align&colon; justify&semi;">Pretty much all routers have a remote administration feature that allows users to log in and modify network settings via the internet&period; To minimize the risk of malicious outside user gaining unauthorized access to your network&comma; it’s recommended that you disable remote administration&period; Administrative changes should only be made from inside the network&period;<&sol;p>&NewLine;<h3 style&equals;"text-align&colon; justify&semi;"><strong>Implement a Disaster Recovery Plan<&sol;strong><&sol;h3>&NewLine;<p style&equals;"text-align&colon; justify&semi;">Even the smallest of businesses can benefit from a disaster recovery plan&period; It’s definitely worth implementing one&comma; especially when you consider that the loss of data could be critical to the success of your business&period; You should have a plan in place that covers both man-made and natural disasters&period; If you already have a disaster recovery plan in place&comma; make sure you test at least once a year&period;<&sol;p>&NewLine;

Exit mobile version