Six Basic Steps For Better Security Cm101247
Upcoming SlideShare
Loading in...5
×
 

Six Basic Steps For Better Security Cm101247

on

  • 180 views

 

Statistics

Views

Total Views
180
Views on SlideShare
179
Embed Views
1

Actions

Likes
0
Downloads
0
Comments
0

1 Embed 1

http://www.linkedin.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Six Basic Steps For Better Security Cm101247 Six Basic Steps For Better Security Cm101247 Document Transcript

  • 6 Basic Steps for Better SecurityBusinesses of all sizes are vulnerable to security threats, and  Your service provider should offer anti-virus protectionnew hazards seem to arise daily. Small and midsize business at the network level to neutralize threats before theymay have fewer resources for dealing with security threats, reach your inbox.but no less responsibility for them. How do you reducethe risk of data exposure, minimize vulnerabilities in your 4. Maintain a Firewallnetwork, ensure regulatory compliance and still maintain  A firewall is particularly crucial when your Internet productive access to information? connection is always on.  Your firewall establishes a protective layer between The best data security practices are often a mix of the outside world and your network to preventtechnologies and policies that ensure that those unauthorized access.technologies are used correctly. Follow these six  Many network routers include a firewall as part essential steps to help protect your business of the solution.and improve productivity. 5. Track Your Security Logs1. Develop a Plan A clear, comprehensive  Your network administrator should regularly review written security plan should cover: network access logs for unusual usage.  The components of your network.  Administrators should also set up reports to inform  Standards to be used for data security, including virus business leaders when viruses, potential hackers or protection, firewalls, encryption, intrusion detection, etc. other threats are blocked.  Employee responsibilities regarding acceptable use of your network and the Internet. 6. Educate Your Team on Security Threats  How security breaches will be reported and handled.  Urge employees not to download files or e-mail attachments from people they don’t know and to be2. Assess Risk wary of e-mails requesting sensitive information.  Review your network and Internet connections  Talk to your network administrator about using content to determine where you are most vulnerable to controls that monitor Web use. security threats.  Educate employees on how to choose strong  If needed, engage a security expert such as your passwords and remind them not to keep password network solution provider to conduct your security reminders near their computers. audit and make recommendations.  Have your network administrator set computer log-ins so that the system suspends the log-in after3. Protect Against Viruses, Spyware and Spam three unsuccessful attempts.  Equip each computer on your network with anti- virus software so that all files are scanned and Excerpted from the white paper “Best Practices for cleaned regularly. Better Security: Protecting Your Data and Eliminating Vulnerabilities.” Download the full white paper now. ©2011 CenturyLink, Inc. All Rights Reserved. Not to be distributed or reproduced by anyone other than CenturyLink entities and CenturyLink Channel Alliance members. CM101247 07/11