Search This Blog and Content

Thursday, September 2, 2010

Small Business Security - Best Practices

So you are a small business.  You are busy doing numerous tasks and don't have time for everything, but fail to recognize the importance of the security measures below and you could lose everything. Here are some things to think about in regards to that valuable laptop and technology you use everyday and take for granted.  

BEST PRACTICES
No single set of rules will protect every business, but thoughtful owners and managers take steps like these:

Close security gaps: Laptops travel, and contractors and visitors connect to your network. Protect network endpoints, not just perimeter.
Integrate defenses: Combine antivirus, firewall, intrusion detection, and vulnerability management at endpoints – with encryption if they travel.
Patch software: Threats evolve – close vulnerabilities by quickly applying updates you recover from Microsoft and other software providers.
Update virus definitions: Threats evolve – make sure your antivirus software recognizes them, by keeping your virus definitions up to date.
Alert employees: Warn them about the risks of attachments and links in unexpected email, and downloaded software before it is scanned for viruses.
Don’t invite trouble: File-sharing programs and free downloads may install malicious code automatically. Stop them with training, policies, and software.
Strengthen passwords: Require passwords that mix letters and numbers – never names or dictionary words – and change them often.
Schedule backups: Implement and enforce backup schedules – and automate the process as much as possible.
Back up systems, too: Backups are only as good as your ability to use the information you recover, so back up systems and applications as well as files.
Keep backups offsite: Fire, flood, vandalism, and sabotage are facts. Be sure files and systems can survive loss of your facility, or even a regional disaster.
Test backups: Don’t wait until data recovery to discover a resource, process, or technical shortcoming – test the entire backup and recovery cycle.
Get help: Find a local IT partner who understands and can help with both your business and technical requirements, and whom you trust.

Many of these security features take some time to set up, but can be automated once established.  Set a calendar appointment or designate a partner or employee to take care of those items that need some human judgement.    

Thanks to Symantec for these great security measures.