SlideShare a Scribd company logo
1 of 15
Download to read offline
Ultimate 10-Step IT Security Checklist for
Protecting your Business from a
Breach
A Publication of
WWW.PARANET.COM SHARE EBOOK
Ultimate 10-Step IT Security Checklist // 2
Paranet IT Consulting Services
IT is complex,
managing it shouldn’t be.
IT Advisory
Network &
Convergence
IT Due Diligence IT Security
Virtualization Backup & DR
http://info.paranet.com/security-vulnerability-assessment
REQUEST A SECURITY
ASSESSMENT
WWW.PARANET.COM SHARE EBOOK
Ultimate 10-Step IT Security Checklist // 3
Ultimate 10-Step IT Security Checklist
by Quinn Devery
Quinn Devery is the Director of Marketing at Paranet Solutions as
well as the founder of DFW IT Professionals. He is responsible for
Paranet’s marketing efforts and channel strategy. Follow Quinn on
Twitter @qdevery or on LinkedIn.
WWW.PARANET.COM SHARE EBOOK
Ultimate 10-Step IT Security Checklist // 4
Introduction
Enterprise security is a many tentacled beast. Each time a vulnerability is patched by an anti-virus firm or IT product
vendor, hackers find a new hole to stay one step ahead of the most advanced IT security professionals. In addition to this
constant war between security vendors and hackers, every security solution you add to your business has an impact on
agility or productivity. For example, encrypting all of the data in the enterprise would prevent many breaches, but the cost
in systems performance and business operations would cripple most organizations.
All of this means there is never an end to the IT security battle, and there are no fool-proof ways to protect businesses
from a breach. In most companies today, a lot rides on the data within networks, and fighting it without the right expertise
is a constant challenge.
To help keep your business safe from the threats that exist today, we’ve put together a 10-step IT security checklist to miti-
gate the risk of a security breach. Hackers are like thieves constantly looking to slip through an unlocked door rather than
assaulting you over 10-foot fences guarded by German shepherds. Have your IT support staff or managed IT services pro-
vider use this checklist to help make your organization a harder target.
WWW.PARANET.COM SHARE EBOOK
Ultimate 10-Step IT Security Checklist // 5
1. Train Your Employees
Your IT security is only as strong as your weakest link. Train your employees
to use strong passwords, to not open email from people they don’t recognize
and to not click on suspicious attachments. Passwords are a big problem. In
one recent study, a majority of hack attacks could have been prevented with
better password practices. You need a password policy that, if it doesn’t require
multi-factor authentication, at least requires users to switch it up on a regular
basis.
A recent experiment showed 85 percent of mobile users connected to Wi-Fi
hotspots without checking. A security expert then captured login information
from all users connected to the hotspot. Here are some other scary stats:
	 637,965,373 passwords were leaked globally in 2012.
	 76 percent of people who use public Wi-Fi don’t use any security mea		
	sures.
WWW.PARANET.COM SHARE EBOOK
Ultimate 10-Step IT Security Checklist // 6
2. Know where your data lives
Do you know where all your confidential information is? You should. And, you
should limit access to private or confidential data. That includes setting up tools that
alert you when that data is accessed.
	 68 percent of businesses still use email as their main method to send and ex 		
	 change large files and sensitive data.
	 Only 17 percent of businesses take any steps to secure company data on 		
	 personal devices.
With stats like these you need to do the following checks:
	 Make a list of where all you most sensitive & critical data lives for your 			
	 user files, application data, and backups.
	 Make a best effort to consolidate and centralize sensitive and critical 			
	 data on file servers and in the data center
	 Limit and/or block applications that are not approved by the enterprise and 		
	 synchronize data to a 3rd party cloud or somewhere else outside the corporate 	
	network
WWW.PARANET.COM SHARE EBOOK
Ultimate 10-Step IT Security Checklist // 7
3. Inventory your devices
Tools are available that can identify and secure all devices
your employees are using on your network, including BYODs.
You need an inventory of everything from thumb drives to
smartphones and tablets to laptops.
	 Smart Phones
	Tablets
	 Network Devices
	PCs
	Laptops
	Servers
WWW.PARANET.COM SHARE EBOOK
Ultimate 10-Step IT Security Checklist // 8
4. Protect your network
You need to be using virtual private networks (VPNs) and firewalls to pro-
tect your network. Today’s users want access from anywhere, at any time,
on any device. That means all kinds of new security risks. With the right
protocols, your employees can enjoy both flexibility and security.
	 Only 53 percent of IT leaders are confident their SaaS applications 	
	 are secure.
	 35 percent of SaaS apps are not evaluated for security prior to de		
	ployment.
	 Only 49 percent of businesses evaluate a IaaS provider’s security 		
	 prior to deployment.
WWW.PARANET.COM SHARE EBOOK
Ultimate 10-Step IT Security Checklist // 9
5. Secure physical devices
Your business may have an open-door policy, but not when it
comes to IT security. Your servers and unused devices should
be kept behind locked doors with limited access.
	 Limit the number of employees who have physical ac	
	 cess to your infrastructure and devices
	 Keep track of lost keys and quickly replace physical 	
	security
	 Vet your managed it services provider for security poli	
	 cies and protocols
	 Choose a datacenter provider that meets SAS 70 II and/	
	 or SSAE 16 requirements
WWW.PARANET.COM SHARE EBOOK
Ultimate 10-Step IT Security Checklist // 10
6. Keep your facilities safe
You probably have given thought to security access to pro-
tect your personnel. The same principle applies for your IT.
You don’t want strangers wandering your halls. Limit physi-
cal access to areas where your IT hardware exists.
	 Know your office building’s security policies
	 Invest in key card access for employees to keep 		
	 strangers out
	 Invest in video surveillance for your office in the case 	
	 something does go wrong
WWW.PARANET.COM SHARE EBOOK
Ultimate 10-Step IT Security Checklist // 11
7. Protect your website & ensure safe browsing
Protect yourself and employees with strong anti-malware and reassure
customers by using trustmarks on your website. You might be sur-
prised how many more clicks you get when you reassure customers
your site is safe.
	 Centralize anti-virus deployment, management, and policies
	 Deploy IPS/IDS systems for logging and threat analysis
	 Evaluate web-application firewalls for additional protection
	 Perform an annual 3rd party security assessment that includes 	
	 penetration testing and external scanning
WWW.PARANET.COM SHARE EBOOK
Ultimate 10-Step IT Security Checklist // 12
8. Create clear IT security policies
Research indicates half of businesses have experienced an increase in malware at-
tacks because of employees’ use of social media. Look at these stats on
	 53 percent of public Wi-Fi users log onto social networking sites. Are they 	
	 doing so with a work-provided computer?
	 32 percent of public Wi-Fi users were not aware of the risks; 13 percent were 	
	 concerned with the risks; only 17 percent of users knew the risks.
You’re not going to end the use of social media – your business might depend on it.
However, you can set clear, written policies on how your devices may be used, and
on the use and disposal of confidential documents.
WWW.PARANET.COM SHARE EBOOK
Ultimate 10-Step IT Security Checklist // 13
9. Properly dispose of end-of-life devices & documents
Management and disposal of retired IT assets is a critical element
in both keeping yourself in compliance with a growing number
of laws and holding data thieves at bay. You should be “digitally
shredding” data from old machines and discarding those ma-
chines properly. Follow recommended procedures when hiring
an asset retirement vendor and work with the company selling
you new technology to see if they can help take the old stuff off
your hands safely.
	 Identify assets that hold potentially sensitive data
	 Wipe all end-of-life devices
	 Use a 3rd party for hard drive destruction of sensitive 		
	 customer data
	 Reconcile end-of-life device disposal with asset inventory
WWW.PARANET.COM SHARE EBOOK
Ultimate 10-Step IT Security Checklist // 14
10. Screen employees thoroughly
You should be conducting background checks on the people you
hire, particularly those you are entrusting with your secure IT. You
also should be limiting access to administrative IT accounts and
setting up alerts whenever those accounts are used to access sensi-
tive information.
	 Employ a third-party screening company for back			
	 ground checks and drug testing.
	 Make checking employee references a policy.
	 Develop a standard set of interview questions that 			
	 hiring managers must use.
WWW.PARANET.COM SHARE EBOOK
Ultimate 10-Step IT Security Checklist // 15
CONCLUSION
A successful IT security department isn’t one that can defend any attack from any attacker. A good IT security profession-
al will make their organization less of a target and focus their efforts on defending their most critical assets such as client
data, Intellectual property and trade secrets.
Follow this checklist and you’ll be well prepared to protect your organization from malicious people and organizations
both internal and external.
Thanks for Reading

More Related Content

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

Ultimate it security checklist

  • 1. Ultimate 10-Step IT Security Checklist for Protecting your Business from a Breach A Publication of
  • 2. WWW.PARANET.COM SHARE EBOOK Ultimate 10-Step IT Security Checklist // 2 Paranet IT Consulting Services IT is complex, managing it shouldn’t be. IT Advisory Network & Convergence IT Due Diligence IT Security Virtualization Backup & DR http://info.paranet.com/security-vulnerability-assessment REQUEST A SECURITY ASSESSMENT
  • 3. WWW.PARANET.COM SHARE EBOOK Ultimate 10-Step IT Security Checklist // 3 Ultimate 10-Step IT Security Checklist by Quinn Devery Quinn Devery is the Director of Marketing at Paranet Solutions as well as the founder of DFW IT Professionals. He is responsible for Paranet’s marketing efforts and channel strategy. Follow Quinn on Twitter @qdevery or on LinkedIn.
  • 4. WWW.PARANET.COM SHARE EBOOK Ultimate 10-Step IT Security Checklist // 4 Introduction Enterprise security is a many tentacled beast. Each time a vulnerability is patched by an anti-virus firm or IT product vendor, hackers find a new hole to stay one step ahead of the most advanced IT security professionals. In addition to this constant war between security vendors and hackers, every security solution you add to your business has an impact on agility or productivity. For example, encrypting all of the data in the enterprise would prevent many breaches, but the cost in systems performance and business operations would cripple most organizations. All of this means there is never an end to the IT security battle, and there are no fool-proof ways to protect businesses from a breach. In most companies today, a lot rides on the data within networks, and fighting it without the right expertise is a constant challenge. To help keep your business safe from the threats that exist today, we’ve put together a 10-step IT security checklist to miti- gate the risk of a security breach. Hackers are like thieves constantly looking to slip through an unlocked door rather than assaulting you over 10-foot fences guarded by German shepherds. Have your IT support staff or managed IT services pro- vider use this checklist to help make your organization a harder target.
  • 5. WWW.PARANET.COM SHARE EBOOK Ultimate 10-Step IT Security Checklist // 5 1. Train Your Employees Your IT security is only as strong as your weakest link. Train your employees to use strong passwords, to not open email from people they don’t recognize and to not click on suspicious attachments. Passwords are a big problem. In one recent study, a majority of hack attacks could have been prevented with better password practices. You need a password policy that, if it doesn’t require multi-factor authentication, at least requires users to switch it up on a regular basis. A recent experiment showed 85 percent of mobile users connected to Wi-Fi hotspots without checking. A security expert then captured login information from all users connected to the hotspot. Here are some other scary stats: 637,965,373 passwords were leaked globally in 2012. 76 percent of people who use public Wi-Fi don’t use any security mea sures.
  • 6. WWW.PARANET.COM SHARE EBOOK Ultimate 10-Step IT Security Checklist // 6 2. Know where your data lives Do you know where all your confidential information is? You should. And, you should limit access to private or confidential data. That includes setting up tools that alert you when that data is accessed. 68 percent of businesses still use email as their main method to send and ex change large files and sensitive data. Only 17 percent of businesses take any steps to secure company data on personal devices. With stats like these you need to do the following checks: Make a list of where all you most sensitive & critical data lives for your user files, application data, and backups. Make a best effort to consolidate and centralize sensitive and critical data on file servers and in the data center Limit and/or block applications that are not approved by the enterprise and synchronize data to a 3rd party cloud or somewhere else outside the corporate network
  • 7. WWW.PARANET.COM SHARE EBOOK Ultimate 10-Step IT Security Checklist // 7 3. Inventory your devices Tools are available that can identify and secure all devices your employees are using on your network, including BYODs. You need an inventory of everything from thumb drives to smartphones and tablets to laptops. Smart Phones Tablets Network Devices PCs Laptops Servers
  • 8. WWW.PARANET.COM SHARE EBOOK Ultimate 10-Step IT Security Checklist // 8 4. Protect your network You need to be using virtual private networks (VPNs) and firewalls to pro- tect your network. Today’s users want access from anywhere, at any time, on any device. That means all kinds of new security risks. With the right protocols, your employees can enjoy both flexibility and security. Only 53 percent of IT leaders are confident their SaaS applications are secure. 35 percent of SaaS apps are not evaluated for security prior to de ployment. Only 49 percent of businesses evaluate a IaaS provider’s security prior to deployment.
  • 9. WWW.PARANET.COM SHARE EBOOK Ultimate 10-Step IT Security Checklist // 9 5. Secure physical devices Your business may have an open-door policy, but not when it comes to IT security. Your servers and unused devices should be kept behind locked doors with limited access. Limit the number of employees who have physical ac cess to your infrastructure and devices Keep track of lost keys and quickly replace physical security Vet your managed it services provider for security poli cies and protocols Choose a datacenter provider that meets SAS 70 II and/ or SSAE 16 requirements
  • 10. WWW.PARANET.COM SHARE EBOOK Ultimate 10-Step IT Security Checklist // 10 6. Keep your facilities safe You probably have given thought to security access to pro- tect your personnel. The same principle applies for your IT. You don’t want strangers wandering your halls. Limit physi- cal access to areas where your IT hardware exists. Know your office building’s security policies Invest in key card access for employees to keep strangers out Invest in video surveillance for your office in the case something does go wrong
  • 11. WWW.PARANET.COM SHARE EBOOK Ultimate 10-Step IT Security Checklist // 11 7. Protect your website & ensure safe browsing Protect yourself and employees with strong anti-malware and reassure customers by using trustmarks on your website. You might be sur- prised how many more clicks you get when you reassure customers your site is safe. Centralize anti-virus deployment, management, and policies Deploy IPS/IDS systems for logging and threat analysis Evaluate web-application firewalls for additional protection Perform an annual 3rd party security assessment that includes penetration testing and external scanning
  • 12. WWW.PARANET.COM SHARE EBOOK Ultimate 10-Step IT Security Checklist // 12 8. Create clear IT security policies Research indicates half of businesses have experienced an increase in malware at- tacks because of employees’ use of social media. Look at these stats on 53 percent of public Wi-Fi users log onto social networking sites. Are they doing so with a work-provided computer? 32 percent of public Wi-Fi users were not aware of the risks; 13 percent were concerned with the risks; only 17 percent of users knew the risks. You’re not going to end the use of social media – your business might depend on it. However, you can set clear, written policies on how your devices may be used, and on the use and disposal of confidential documents.
  • 13. WWW.PARANET.COM SHARE EBOOK Ultimate 10-Step IT Security Checklist // 13 9. Properly dispose of end-of-life devices & documents Management and disposal of retired IT assets is a critical element in both keeping yourself in compliance with a growing number of laws and holding data thieves at bay. You should be “digitally shredding” data from old machines and discarding those ma- chines properly. Follow recommended procedures when hiring an asset retirement vendor and work with the company selling you new technology to see if they can help take the old stuff off your hands safely. Identify assets that hold potentially sensitive data Wipe all end-of-life devices Use a 3rd party for hard drive destruction of sensitive customer data Reconcile end-of-life device disposal with asset inventory
  • 14. WWW.PARANET.COM SHARE EBOOK Ultimate 10-Step IT Security Checklist // 14 10. Screen employees thoroughly You should be conducting background checks on the people you hire, particularly those you are entrusting with your secure IT. You also should be limiting access to administrative IT accounts and setting up alerts whenever those accounts are used to access sensi- tive information. Employ a third-party screening company for back ground checks and drug testing. Make checking employee references a policy. Develop a standard set of interview questions that hiring managers must use.
  • 15. WWW.PARANET.COM SHARE EBOOK Ultimate 10-Step IT Security Checklist // 15 CONCLUSION A successful IT security department isn’t one that can defend any attack from any attacker. A good IT security profession- al will make their organization less of a target and focus their efforts on defending their most critical assets such as client data, Intellectual property and trade secrets. Follow this checklist and you’ll be well prepared to protect your organization from malicious people and organizations both internal and external. Thanks for Reading