[mc4wp_form id=”2320″]
You already route your network through a secure colocation data centre. You’ve installed the latest antivirus software on your computers, and you’ve purchased your internet service from a reliable provider. However, even though you’ve laid the groundwork for a secure business network, it still faces hacker and virus threats because of employee error.
Your employees don’t mean to endanger your company. They probably have the same web-surfing habits at work that they do at home. They visit the same kinds of websites and click on the same alluring links. However, their habits have put other employees’ and customers’ sensitive information at risk. That security risk could disrupt your business’s finances and productivity as well.
To mitigate security risks, give your employees the following rules.
The unbreakable password has many complicated characters and changes constantly. As your employees create passwords for their work computers, work email accounts, employee portals, and more, instruct them to use passwords that meet the following criteria:
When your employees create their passwords with these guidelines, hackers have to guess between 90 different variables for at least 8 digits, leading to more than 750 variables overall with millions and millions of different character combinations. Only a dedicated hacker could crack even one of those passwords.
Additionally, make your employees change their passwords at least once a month. The change mitigates the risk of a hacker or computer program invading your network even if it does figure out one password.
A virus may only infect one computer at a time. When that happens, the virus could destroy data on that single computer. The loss of even a small portion of your company’s data could ruin overall productivity, so have all your employees save their work on a secure server, not just their computer’s hard drive.
Employees might not know how to spot disreputable downloads. Tell them that they may not download any programs or files without permission from their supervisors. And supervisors should have a list of acceptable downloads. Not only do downloads represent a security risk, but they could clog your business’s bandwidth and reduce productivity.
As an additional security measure, install administrative passwords on every computer so that employees can’t download anything or change the computer’s network settings without help from IT or a supervisor.
Employees must leave these filters and programs running at all times, even when they restrict them from playing a video or audio clip. These filters may also restrict them from visiting their favourite websites. But no matter what, the filters must remain.
Again, place an administrative password on these filters and programs if you think your employees might disable them despite your rules.
Most employees should recognize when they receive a spam email. They’ll know not to click any links, and they’ll throw the email away. However, some employees don’t have the experience to recognize spam. Tell them that their emails must meet the following requirements before they follow the attached links:
Some email providers find and sort spam automatically. Others even scan attachments before allowing users to download them. However, even if your company’s email doesn’t have these features, you can still use antivirus software to do the same thing.
Employees shouldn’t spend much, if any, time surfing the web at work anyway. You pay them to create products and do tasks. However, employees have the freedom to browse social media, news, and informational websites on their breaks, and they may accidentally follow links that lead to viruses and spam.
Train employees on how to recognize these dangerous links, and give them a list of safe websites they may freely visit on their breaks.
Mobile devices usually have fewer security features than computers. Tell your employees to use data, or set up a guest network that doesn’t intersect with your primary one.
After you implement these rules, instruct employees to report any suspicious internet activity. For more security tips specific to your business, contact your colocation facility or network provider.
– source: IsoFusion.com