6 Basic Steps for Better SecurityBusinesses of all sizes are vulnerable to security threats, and            Your service ...
Upcoming SlideShare
Loading in …5

Six Basic Steps For Better Security Cm101247


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Six Basic Steps For Better Security Cm101247

  1. 1. 6 Basic Steps for Better SecurityBusinesses of all sizes are vulnerable to security threats, and  Your service provider should offer anti-virus protectionnew hazards seem to arise daily. Small and midsize business at the network level to neutralize threats before theymay have fewer resources for dealing with security threats, reach your inbox.but no less responsibility for them. How do you reducethe risk of data exposure, minimize vulnerabilities in your 4. Maintain a Firewallnetwork, ensure regulatory compliance and still maintain  A firewall is particularly crucial when your Internet productive access to information? connection is always on.  Your firewall establishes a protective layer between The best data security practices are often a mix of the outside world and your network to preventtechnologies and policies that ensure that those unauthorized access.technologies are used correctly. Follow these six  Many network routers include a firewall as part essential steps to help protect your business of the solution.and improve productivity. 5. Track Your Security Logs1. Develop a Plan A clear, comprehensive  Your network administrator should regularly review written security plan should cover: network access logs for unusual usage.  The components of your network.  Administrators should also set up reports to inform  Standards to be used for data security, including virus business leaders when viruses, potential hackers or protection, firewalls, encryption, intrusion detection, etc. other threats are blocked.  Employee responsibilities regarding acceptable use of your network and the Internet. 6. Educate Your Team on Security Threats  How security breaches will be reported and handled.  Urge employees not to download files or e-mail attachments from people they don’t know and to be2. Assess Risk wary of e-mails requesting sensitive information.  Review your network and Internet connections  Talk to your network administrator about using content to determine where you are most vulnerable to controls that monitor Web use. security threats.  Educate employees on how to choose strong  If needed, engage a security expert such as your passwords and remind them not to keep password network solution provider to conduct your security reminders near their computers. audit and make recommendations.  Have your network administrator set computer log-ins so that the system suspends the log-in after3. Protect Against Viruses, Spyware and Spam three unsuccessful attempts.  Equip each computer on your network with anti- virus software so that all files are scanned and Excerpted from the white paper “Best Practices for cleaned regularly. Better Security: Protecting Your Data and Eliminating Vulnerabilities.” Download the full white paper now. ©2011 CenturyLink, Inc. All Rights Reserved. Not to be distributed or reproduced by anyone other than CenturyLink entities and CenturyLink Channel Alliance members. CM101247 07/11