It’s a bright, shining new year! A great way for your business to start 2016 is a review of your computer network security systems. Your customers and employees entrust you with their precious personal data, including their credit card numbers, and perhaps even their medical records. It’s a great feeling to start the year knowing that your company is keeping their information safe for them.
Step 1: A Password Review. Did you know that there’s a difference between enterprise-grade password systems and those used for consumers? One reason for this is the need to comply with industry regulations. Another is the high stakes of password security for businesses: it’s far worse to suffer a hack of your clients’ social security numbers than of your own personal Facebook profile.
You may be surprised to know that password security is more than choosing the right string of characters, or even deciding whether you need two-step password authentication. Password security includes deciding on a schedule for password rotation, the duration that devices are active before requiring the reentry of passwords, the security of password storage methods, and the security of “security questions.” All of these protocols, and more, have to right for YOUR business. What’s right for one business may be unnecessarily burdensome for another.
The most important thing is that your authentication system is actively managed and regularly reviewed.
Step 2: A Device Review. Are ALL of the tech devices associated with your company included in your security plan? Think bigger than the individual computer workstations in your office. Think even bigger than your your modem and your backup drives. Think about the “cloud” where you store your data. Think about the tablets and phones that you and your employees use every day, and the “clouds” where they store their data.
Now that you’ve identified your company’s hackable areas, make sure they are protected. Ask your IT employee or IT service provider if you have an integrated security system, and ask how it works. If your company’s security plan doesn’t cover all of your vulnerable areas, you may want to find a managed IT service that can do this for you.
Step 3: Security Patch Installation. Security patches for the applications and services that your company uses are released all the time, often at odd hours when no one is in your office. How quickly does your business notice these patches and install them? You may want a managed service IT service to install them as soon as they appear.
In Conclusion: The security issues above are not the only ones that your business will face, but they’re the three that are familiar to most business owners and managers. If you do these three reviews and you’re concerned that your network isn’t completely protected, get a professional review by a managed IT service provider.
CMIT Solutions of Gilbert and Mesa (Arizona) is a provider of managed IT services. We can be reached at 480.926.6445 or firstname.lastname@example.org
Dateline: Monday, January 4, 2016
Author: CMIT Solutions of Gilbert and Mesa