1. Inspect and Test the
Configured Computer
Networks
Check Computer Networks to
Ensure Safe Operation
Reporter:Joshua T. Asis
2. Computer network security breaches are in
the news often, and they’re costing
organizations that fall prey millions of
dollars.
Computer network problems and issues are
always a trending news in any part of the
world.
3. Fortunately, there are some computer
network security best practices that
business owners can implement today to
secure their data and build more
impenetrable protection against hackers
and viruses.
5. 1. Install And Monitor Firewall Performance
A firewall is designed to block unauthorized access to
computers and networks. In essence, a firewall is a set of rules
that controls network traffic — incoming and outgoing.
Computers and networks that pass these rules are granted
access, and those that don’t are walled out.
2. Update Passwords When Needed and/or Yearly
to using strong passwords that feature letters (uppercase and
lowercase), symbols and numbers for added security, require
employees to regularly change their passwords.
6. 3. Lean on Advanced Endpoint Detection
In order to respond to the continually evolving online threats in the
world today, advanced endpoint detection and response is technology
that uses AI to watch for indications of compromise and react
accordingly.
4. Create A Virtual Private Network (VPN)
With millions of people working remotely in a cosmic work shift
accelerated by the pandemic, there’s been a massive increase in
reported cybercrimes. VPNs create a more secure connection
between remote computers and company servers.
7. 5. Must Have Proper Training
Every preparation you have won’t be effective if the people using your
system aren’t following security best practices. Educating
people about how to avoid major security risks or getting victimized
by identity theft is possibly the greatest weapon you Ahave in boosting
your security.
6. Filter and Delete Spam Emails
Spam filters have advanced considerably and should be leveraged.
8. 7. Shut Down Computers When Not in Use
When your computer sits idle overnight while connected to the internet or
your own network, it becomes more visible and available to hackers.
Limit their access and block them outright just by shutting your computer
down for the night.
8. Encrypt Your Files
Encryption can protect sensitive data on Windows or Mac operating
systems using software specifically designed to mask your IP address.
9. 9. Secure Personal Devices
Consider implementing a policy for using personal devices to ensure
individuals are following security protocols.
10. Ask for Help
enlist the help of a technology management provider that stays
updated on the latest threats and whose job it is to make your systems
as secure as possible.
10. REMEMBER
You must be knowledgeable of the these
ways on what to KNOW, perform activities
required under WHAT and HOW to
PROCESS.
11. Quiz Time!
1. What are the 10 Proven ways to
secure/check a computer network? (10pts.)
2.What is the Importance Inspect and Test
the Configured Computer Networks.
(5pts.)
12.
13. Answer Key:
10 Proven Ways to Secure/ Check a Computer Network
1. Install And Monitor Firewall Performance
2. Update Passwords When Needed and/or Yearl
3. Lean on Advanced Endpoint Detection
4. Create A Virtual Private Network (VPN)
5. Must Have Proper Training
6. Filter and Delete Spam Emails
7. Shut Down Computers When Not in Use
8. Encrypt Your Files
9. Secure Personal Devices
10. Ask for Help
2. Answer may vary.