SlideShare a Scribd company logo
1 of 10
Disaster-Proofing Your Computer Systems

                                                                  Andrew Cahill
                                                            Wolfhound Software
                                              http://www.wolfhoundsoftware.com




          Copyright © 2010, Wolfhound Software. All Worldwide rights reserved.
Disaster-Proofing
   Why Disaster-Proofing a Small Business
    is So Important
     Data disasters tend to strike when you least
      expect.
     Ignoring basic disaster recovery planning can be
      very dangerous to your company’s survival.
     Small businesses without a formal in-house
      computer support function are especially
      vulnerable to these potentially catastrophic risks.
Physical Security
   Procedures need to be in place to guard
    your data backups against tampering or
    theft.

   Critical technology assets, such as
    servers, hubs, routers and phone system
    controllers, should be in locked areas of
    your office.
PC/Workstation Security
   Your company’s desktop PCs and
    notebooks need to run a locally securable
    operating system.

   Be sure power-on passwords are used to
    prevent unauthorized boot-ups or
    tampering with BIOS configuration
    settings.
Network Security
   Protect individual data files on network-
    shared folders.

   Make sure usernames and passwords are
    required to logon to all servers.

   Policies need to be in place that mandate
    sophisticated password selections.
Data Backup
   Know where all of your company’s crucial
    data files are located and how these files
    are being backed up.

   There should be automation and controls
    in place to make sure that data backup
    jobs run correctly and consistently.
Organizational Concerns
   Keep common, easy-to-replace spare
    hardware parts, such as a mouse, keyboard
    or monitor, on hand to minimize downtime.

   Employees should have a list of key
    personnel home phone numbers.

   Have a chain of command for deciding that
    an event is in fact a data “disaster” for your
    company.
Power Protection
   Every sensitive electronic device in your
    company, both PC and non-PC equipment,
    should have at least some form of real surge
    protection.

   Don’t be fooled by cheap power strips
    masquerading as surge protectors.

   Protect your telecommunications lines with
    appropriate data line surge protection.
Virus Protection
   Antivirus software needs to be installed on
    every desktop PC, notebook and server in
    your organization and should be current.

   Your e-mail client applications and server(s)
    need to be protected to keep viruses from
    spreading through inbound (POP3),
    outbound (SMTP) and other related
    messaging mechanisms.

   End users should be trained on how to
    recognize telltale signs of a virus.
The Bottom Line

It’s impossible to plan for every conceivable data
disaster, but there are a number of painless and
inexpensive best practices your company can put
into place right away to get proactive.

Learn How You Can Disaster-Proof
Your Computers ... BEFORE It's Too Late!"

More Related Content

What's hot

How Computer Network Support System Work Against Hacking?
How Computer Network Support System Work Against Hacking?How Computer Network Support System Work Against Hacking?
How Computer Network Support System Work Against Hacking?jeremyhall724
 
Checklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workersChecklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workersPeter Hagen
 
ways that data can be lost and how to prevent it.
ways that data can be lost and how to prevent it.ways that data can be lost and how to prevent it.
ways that data can be lost and how to prevent it.wolfblood11
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy Dguest34b014
 
Design a systematic monitoring, evaluating and updating
Design a systematic monitoring, evaluating and updatingDesign a systematic monitoring, evaluating and updating
Design a systematic monitoring, evaluating and updatingLeonel Rivas
 
MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system securityJan Wong
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009OS-Cubed, Inc.
 
Safeguard your business with Microsoft Office 365 and PlanBcp
Safeguard your business with Microsoft Office 365 and PlanBcpSafeguard your business with Microsoft Office 365 and PlanBcp
Safeguard your business with Microsoft Office 365 and PlanBcparnoldvilleneuve
 
DataPreserve- SEVRAR Jan 09
DataPreserve- SEVRAR Jan 09DataPreserve- SEVRAR Jan 09
DataPreserve- SEVRAR Jan 09Mike Garland
 
L007 Managing System Security (2016)
L007 Managing System Security (2016)L007 Managing System Security (2016)
L007 Managing System Security (2016)Jan Wong
 
IT-Audit C&A
IT-Audit C&AIT-Audit C&A
IT-Audit C&AMang Sum
 
Acuity Sos Overview
Acuity Sos OverviewAcuity Sos Overview
Acuity Sos Overviewdavidwells
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyJan Wong
 
Cyber Resilience - Contemporary once again for Managing Data Protection post-...
Cyber Resilience - Contemporary once again for Managing Data Protection post-...Cyber Resilience - Contemporary once again for Managing Data Protection post-...
Cyber Resilience - Contemporary once again for Managing Data Protection post-...SSFIndia1
 
Managing i.t security
Managing i.t securityManaging i.t security
Managing i.t securityOriginalGSM
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatanceKudzi Chikwatu
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention GuideBrian Honan
 

What's hot (20)

How Computer Network Support System Work Against Hacking?
How Computer Network Support System Work Against Hacking?How Computer Network Support System Work Against Hacking?
How Computer Network Support System Work Against Hacking?
 
IP-guard Catalog
IP-guard CatalogIP-guard Catalog
IP-guard Catalog
 
9080
90809080
9080
 
Checklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workersChecklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workers
 
ways that data can be lost and how to prevent it.
ways that data can be lost and how to prevent it.ways that data can be lost and how to prevent it.
ways that data can be lost and how to prevent it.
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy D
 
Design a systematic monitoring, evaluating and updating
Design a systematic monitoring, evaluating and updatingDesign a systematic monitoring, evaluating and updating
Design a systematic monitoring, evaluating and updating
 
MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system security
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009
 
Safeguard your business with Microsoft Office 365 and PlanBcp
Safeguard your business with Microsoft Office 365 and PlanBcpSafeguard your business with Microsoft Office 365 and PlanBcp
Safeguard your business with Microsoft Office 365 and PlanBcp
 
DataPreserve- SEVRAR Jan 09
DataPreserve- SEVRAR Jan 09DataPreserve- SEVRAR Jan 09
DataPreserve- SEVRAR Jan 09
 
L007 Managing System Security (2016)
L007 Managing System Security (2016)L007 Managing System Security (2016)
L007 Managing System Security (2016)
 
IT-Audit C&A
IT-Audit C&AIT-Audit C&A
IT-Audit C&A
 
Acuity Sos Overview
Acuity Sos OverviewAcuity Sos Overview
Acuity Sos Overview
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
 
Cyber Resilience - Contemporary once again for Managing Data Protection post-...
Cyber Resilience - Contemporary once again for Managing Data Protection post-...Cyber Resilience - Contemporary once again for Managing Data Protection post-...
Cyber Resilience - Contemporary once again for Managing Data Protection post-...
 
Managing i.t security
Managing i.t securityManaging i.t security
Managing i.t security
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention Guide
 
Test
TestTest
Test
 

Similar to Disaster Proofing Your Computer Systems

How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19Dharmendra Rama
 
15 Way to Protect Your Business From a Cyberattack .pdf
15 Way to Protect Your Business From a Cyberattack .pdf15 Way to Protect Your Business From a Cyberattack .pdf
15 Way to Protect Your Business From a Cyberattack .pdfBorja ARRIZABALAGA URIARTE
 
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxCheck-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxkris harden
 
_7 Cybersecurity Tips for Small Businesses
_7 Cybersecurity Tips for Small Businesses_7 Cybersecurity Tips for Small Businesses
_7 Cybersecurity Tips for Small BusinessesInstasafe1
 
What we do
What we doWhat we do
What we dobcolbeck
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfPolicypros.co.uk
 
Why You Need An Antivirus For Your Business?
Why You Need An Antivirus For Your Business?Why You Need An Antivirus For Your Business?
Why You Need An Antivirus For Your Business?SoftwareDeals
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutionsabe8512000
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoTCanon Business CEE
 
UCloud Asia Company Presentation
UCloud Asia Company PresentationUCloud Asia Company Presentation
UCloud Asia Company PresentationUCloud Asia Pte Ltd
 
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Pte Ltd
 
Infographic-1-MainFrame BlindSpots_082015
Infographic-1-MainFrame BlindSpots_082015Infographic-1-MainFrame BlindSpots_082015
Infographic-1-MainFrame BlindSpots_082015Clint Walker
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public schoolDevku45
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 
HEM INNOVATIVE SOLUTIONS
HEM INNOVATIVE SOLUTIONSHEM INNOVATIVE SOLUTIONS
HEM INNOVATIVE SOLUTIONSKen Dailey
 

Similar to Disaster Proofing Your Computer Systems (20)

Chapter 5
Chapter 5Chapter 5
Chapter 5
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
15 Way to Protect Your Business From a Cyberattack .pdf
15 Way to Protect Your Business From a Cyberattack .pdf15 Way to Protect Your Business From a Cyberattack .pdf
15 Way to Protect Your Business From a Cyberattack .pdf
 
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxCheck-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
 
_7 Cybersecurity Tips for Small Businesses
_7 Cybersecurity Tips for Small Businesses_7 Cybersecurity Tips for Small Businesses
_7 Cybersecurity Tips for Small Businesses
 
What we do
What we doWhat we do
What we do
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
 
Why You Need An Antivirus For Your Business?
Why You Need An Antivirus For Your Business?Why You Need An Antivirus For Your Business?
Why You Need An Antivirus For Your Business?
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
 
UCloud Asia Company Presentation
UCloud Asia Company PresentationUCloud Asia Company Presentation
UCloud Asia Company Presentation
 
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
 
Infographic-1-MainFrame BlindSpots_082015
Infographic-1-MainFrame BlindSpots_082015Infographic-1-MainFrame BlindSpots_082015
Infographic-1-MainFrame BlindSpots_082015
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ransomware
RansomwareRansomware
Ransomware
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
HEM INNOVATIVE SOLUTIONS
HEM INNOVATIVE SOLUTIONSHEM INNOVATIVE SOLUTIONS
HEM INNOVATIVE SOLUTIONS
 

Disaster Proofing Your Computer Systems

  • 1. Disaster-Proofing Your Computer Systems Andrew Cahill Wolfhound Software http://www.wolfhoundsoftware.com Copyright © 2010, Wolfhound Software. All Worldwide rights reserved.
  • 2. Disaster-Proofing  Why Disaster-Proofing a Small Business is So Important  Data disasters tend to strike when you least expect.  Ignoring basic disaster recovery planning can be very dangerous to your company’s survival.  Small businesses without a formal in-house computer support function are especially vulnerable to these potentially catastrophic risks.
  • 3. Physical Security  Procedures need to be in place to guard your data backups against tampering or theft.  Critical technology assets, such as servers, hubs, routers and phone system controllers, should be in locked areas of your office.
  • 4. PC/Workstation Security  Your company’s desktop PCs and notebooks need to run a locally securable operating system.  Be sure power-on passwords are used to prevent unauthorized boot-ups or tampering with BIOS configuration settings.
  • 5. Network Security  Protect individual data files on network- shared folders.  Make sure usernames and passwords are required to logon to all servers.  Policies need to be in place that mandate sophisticated password selections.
  • 6. Data Backup  Know where all of your company’s crucial data files are located and how these files are being backed up.  There should be automation and controls in place to make sure that data backup jobs run correctly and consistently.
  • 7. Organizational Concerns  Keep common, easy-to-replace spare hardware parts, such as a mouse, keyboard or monitor, on hand to minimize downtime.  Employees should have a list of key personnel home phone numbers.  Have a chain of command for deciding that an event is in fact a data “disaster” for your company.
  • 8. Power Protection  Every sensitive electronic device in your company, both PC and non-PC equipment, should have at least some form of real surge protection.  Don’t be fooled by cheap power strips masquerading as surge protectors.  Protect your telecommunications lines with appropriate data line surge protection.
  • 9. Virus Protection  Antivirus software needs to be installed on every desktop PC, notebook and server in your organization and should be current.  Your e-mail client applications and server(s) need to be protected to keep viruses from spreading through inbound (POP3), outbound (SMTP) and other related messaging mechanisms.  End users should be trained on how to recognize telltale signs of a virus.
  • 10. The Bottom Line It’s impossible to plan for every conceivable data disaster, but there are a number of painless and inexpensive best practices your company can put into place right away to get proactive. Learn How You Can Disaster-Proof Your Computers ... BEFORE It's Too Late!"