SlideShare a Scribd company logo
1 of 2
Safeguarding Your Business
As the adoption and reliance on computers, networks and broadband
Internet connectivity grows with small and medium-sized businesses, so
does the threat against security. Small businesses represent 99% of all U.S.
companies and employ more than half the American workforce according
to the Small Business Administration. Because these businesses have
become extremely reliant on their computers, software and networks for
daily operations, they are often challenged with securing these systems that
have become an integral part of their business.
It’s a popular and somewhat dangerous belief that those wishing to breach
corporate computer security overlook small businesses. Because small
business owners push network security issues down the priority list in favor
of more pressing matters, their businesses may be more vulnerable because
they don't have resources to adequately protect themselves against attacks.
In fact, the Gartner Group claims that by the end of 2005, more than 40%
of small businesses that use the Internet for more than email will be
successfully attacked and more than half of the businesses attacked will not
even know it.
What Are the Threats?
Security threats can come in a number of forms including an outright
intrusion by a hacker, operating system vulnerabilities, computer viruses or
spyware. The range of damage from any of these threats can be from a
mere annoyance to data loss or theft of critical personal or business
information—any of which can lead to distraction, lost productivity or
worse, destruction. Some of the more popular security threats include:
• Security holes or vulnerabilities are “bugs” in operating systems and
software applications that can be exploited by hackers. When
vulnerabilities are discovered, hackers often develop exploits or
programs that use the vulnerability to penetrate or disable a computer
or a whole network.
• Direct attacks can be from a disgruntled worker, an unhappy
customer, a competitor or a curious hacker trying to penetrate your
business network.
• Viruses can do damage to a computer system and often spread over
email contact lists and more recently over instant messaging networks,
by disguising themselves as legitimate attachments. Users activate the
code unknowingly, infecting their system or network with the virus,
which often uses the victim’s address book to email themselves to other
users. Viruses can range from merely annoying to extremely
destructive and can be costly. Discounting costs associated with
potential litigation and fines from credit card fraud, a business can also find itself bankrupt!
According to industry expert Symantec, “93% of companies that lost their data for ten days filed for
bankruptcy with one year...”.
• Worms are similar to viruses and much more common. Unlike viruses, which infect programs and
files, worms do not attach themselves to any other software and are self-sustained. One of the most
Twelve Tips for Keeping your
Computers and Networks Secure
1) Perhaps one of the most important
ingredients of a secure network is
awareness. Familiarize yourself
with various security threats.
2) Update your operating systems and
computer software regularly.
3) Purchase antivirus software to
protect your computer from viruses,
worms and Trojans.
4) Install an Internet firewall to prevent
unauthorized Internet traffic from
entering or leaving your computer.
5) Install spam blockers to minimize
unwanted email content.
6) Purchase anti-spyware software to
prevent the transmission of personal
information from your computer.
7) Practice safe emailing and
downloading. Most email viruses
and spyware are spread by opening
infected files. Never open a file
unless you recognize the sender or
are expecting the file.
8) Make regular back-ups of data. Plan
ahead; don’t wait until disaster
strikes to think about backing up
documents, e-mails and other
valuable business data.
9) Create secure and original
passwords. This will ensure privacy
and security.
10) Don’t share computer, email or
network passwords with co-workers
or friends.
11) Turn off your computer when not in
use. The security of your computer
cannot be breeched if the computer
is powered off or if it is
disconnected from the network.
12) Block non-work-related websites,
use of instant messaging and file
sharing programs.
infamous worms was “My.Doom”, which, along with its variants, caused several billion dollars worth
of damage to businesses, ISPs, and home users.
• Trojan horses are software programs that capture passwords and other personal information, and
which can also allow an unauthorized remote user to gain access to the system where the Trojan is
installed.
• Spam is not officially defined as a security threat, but it can seriously damage productivity and
represents a potential risk due to the current rise of malicious software
delivered by spam messages. One example of business threatening spam is
“phishing” , a method used to acquire personal information such as
passwords, bank account and credit card numbers and more through
sophisticated email messages that claim to have come from a specific
provider (eBay or PayPal for example) and appear quite authentic to the
unsuspecting recipient.
• Spyware are malicious programs sometimes found in freeware or
shareware software, as well as in file sharing clients. They can take a toll on
system and network performance and send user data to the spyware authors.
• Inappropriate or illegal content are not considered a security threat,
however there are severe consequences. If, for example, one of your employees shared an off-color
joke with other employees, it could be considered “sexual harassment”, and that could mean litigation
and fines.
Basic Computer Protection
Probably the easiest and most economical prevention a computer user can take to secure their company’s
computers and networks is to exercise safe computing habits. Using good judgment when using the
Internet for web surfing and visiting only well-known and trusted websites, being wary of email
attachments or email from strangers and finally, knowing the capabilities and limitations of your
computer and software applications are all good safeguards.
The next step is to evaluate the risks and allocate the resources to securing your business computing and
network investment. You should consider the harm that could be caused if a competitor retrieved
customer information or if your business lost revenue due to website download. Don’t go overboard by
investing time and money in resources you do not need. Consider outsourcing. Many ISPs offer security
services for small as well as large networks but you may also want to consider a professional IT
consultation, maintenance and repair business that tailors their offerings to small and medium-sized
businesses.
Article submitted by Laurie Breese, Owner of TeamLogic IT of Orland Park.
TeamLogic IT of Orland Park, Illinois is part of a nationwide network of computer consultation
and managed services businesses providing outsourced IT services. Small- to medium-sized
businesses rely on TeamLogic IT to handle a broad range of services from urgent computer
repair and proactive maintenance to the installation of entire networks and more. For more
information, contact Laurie at lbreese@TeamLogicIT.com or visit
www.TeamLogicIT.com./OrlandParkIL
According to the
SANS/Internet Storm
Center the average time a
“clean” (unpatched and
undefended) system can be
connected to the Internet
before being attacked or
scanned was an average of
20-30 minutes.

More Related Content

What's hot

Protection against cyber threats
Protection against cyber threatsProtection against cyber threats
Protection against cyber threatsTIKAJ
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics WebinarTechSoup
 
Importance of cyber security in education sector
Importance of cyber security in education sectorImportance of cyber security in education sector
Importance of cyber security in education sectorSeqrite
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident ReportCommunity IT Innovators
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutMarc Vael
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
It risk assessment in uae
It risk assessment in uaeIt risk assessment in uae
It risk assessment in uaeRishalHalid1
 
At Your Expense
At Your ExpenseAt Your Expense
At Your ExpenseDan Oblak
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness Net at Work
 
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesAqib Syed
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in misI P Abir
 
Cyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe SecurityCyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe SecurityRahul Tyagi
 

What's hot (18)

Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Protection against cyber threats
Protection against cyber threatsProtection against cyber threats
Protection against cyber threats
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics Webinar
 
Importance of cyber security in education sector
Importance of cyber security in education sectorImportance of cyber security in education sector
Importance of cyber security in education sector
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
It risk assessment in uae
It risk assessment in uaeIt risk assessment in uae
It risk assessment in uae
 
At Your Expense
At Your ExpenseAt Your Expense
At Your Expense
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical Challenges
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in mis
 
Cyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe SecurityCyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe Security
 

Viewers also liked

Building e commerce online-chapter_19
Building e commerce online-chapter_19Building e commerce online-chapter_19
Building e commerce online-chapter_19ljun
 
Unit1 Lecture1
Unit1 Lecture1Unit1 Lecture1
Unit1 Lecture1fdherrera
 
Most common ux mistakes to avoid on your website
Most common ux mistakes to avoid on your websiteMost common ux mistakes to avoid on your website
Most common ux mistakes to avoid on your websiteHeadChannel
 
PROJECT PROFILE – INTEGRATED TOURISM RESORT PROJECT IN KALPITIYA
PROJECT PROFILE – INTEGRATED TOURISM RESORT PROJECT IN KALPITIYAPROJECT PROFILE – INTEGRATED TOURISM RESORT PROJECT IN KALPITIYA
PROJECT PROFILE – INTEGRATED TOURISM RESORT PROJECT IN KALPITIYARusLanka Council
 
Small Business Guide to Information Security
Small Business Guide to Information Security Small Business Guide to Information Security
Small Business Guide to Information Security Leo Welder
 
Network Proposal Power Point
Network Proposal Power PointNetwork Proposal Power Point
Network Proposal Power Pointguest7fbe17
 
Introduction to Airline Information System
Introduction to Airline Information SystemIntroduction to Airline Information System
Introduction to Airline Information SystemSiddhartha Tripathi
 
Network proposal ppt
Network proposal pptNetwork proposal ppt
Network proposal pptFrankNitty II
 
Data warehouse architecture
Data warehouse architectureData warehouse architecture
Data warehouse architecturepcherukumalla
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practicesamiable_indian
 
10 Project Proposal Writing
10 Project Proposal Writing10 Project Proposal Writing
10 Project Proposal WritingTony
 
Lead Generation on SlideShare: A How-to Guide
Lead Generation on SlideShare: A How-to GuideLead Generation on SlideShare: A How-to Guide
Lead Generation on SlideShare: A How-to GuideSlideShare
 

Viewers also liked (13)

Building e commerce online-chapter_19
Building e commerce online-chapter_19Building e commerce online-chapter_19
Building e commerce online-chapter_19
 
Unit1 Lecture1
Unit1 Lecture1Unit1 Lecture1
Unit1 Lecture1
 
Most common ux mistakes to avoid on your website
Most common ux mistakes to avoid on your websiteMost common ux mistakes to avoid on your website
Most common ux mistakes to avoid on your website
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
PROJECT PROFILE – INTEGRATED TOURISM RESORT PROJECT IN KALPITIYA
PROJECT PROFILE – INTEGRATED TOURISM RESORT PROJECT IN KALPITIYAPROJECT PROFILE – INTEGRATED TOURISM RESORT PROJECT IN KALPITIYA
PROJECT PROFILE – INTEGRATED TOURISM RESORT PROJECT IN KALPITIYA
 
Small Business Guide to Information Security
Small Business Guide to Information Security Small Business Guide to Information Security
Small Business Guide to Information Security
 
Network Proposal Power Point
Network Proposal Power PointNetwork Proposal Power Point
Network Proposal Power Point
 
Introduction to Airline Information System
Introduction to Airline Information SystemIntroduction to Airline Information System
Introduction to Airline Information System
 
Network proposal ppt
Network proposal pptNetwork proposal ppt
Network proposal ppt
 
Data warehouse architecture
Data warehouse architectureData warehouse architecture
Data warehouse architecture
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
10 Project Proposal Writing
10 Project Proposal Writing10 Project Proposal Writing
10 Project Proposal Writing
 
Lead Generation on SlideShare: A How-to Guide
Lead Generation on SlideShare: A How-to GuideLead Generation on SlideShare: A How-to Guide
Lead Generation on SlideShare: A How-to Guide
 

Similar to Data security

Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?Web Werks Data Centers
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences MagazineThe Lifesciences Magazine
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guidelarry1401
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docxsaivarun91
 
Most Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesMost Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesBryTech INC
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4Anne ndolo
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Small Business
 
Article1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organiArticle1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organimallisonshavon
 

Similar to Data security (20)

Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Information security
Information securityInformation security
Information security
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
Most Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesMost Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling Enterprises
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 
Article1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organiArticle1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organi
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Data security

  • 1. Safeguarding Your Business As the adoption and reliance on computers, networks and broadband Internet connectivity grows with small and medium-sized businesses, so does the threat against security. Small businesses represent 99% of all U.S. companies and employ more than half the American workforce according to the Small Business Administration. Because these businesses have become extremely reliant on their computers, software and networks for daily operations, they are often challenged with securing these systems that have become an integral part of their business. It’s a popular and somewhat dangerous belief that those wishing to breach corporate computer security overlook small businesses. Because small business owners push network security issues down the priority list in favor of more pressing matters, their businesses may be more vulnerable because they don't have resources to adequately protect themselves against attacks. In fact, the Gartner Group claims that by the end of 2005, more than 40% of small businesses that use the Internet for more than email will be successfully attacked and more than half of the businesses attacked will not even know it. What Are the Threats? Security threats can come in a number of forms including an outright intrusion by a hacker, operating system vulnerabilities, computer viruses or spyware. The range of damage from any of these threats can be from a mere annoyance to data loss or theft of critical personal or business information—any of which can lead to distraction, lost productivity or worse, destruction. Some of the more popular security threats include: • Security holes or vulnerabilities are “bugs” in operating systems and software applications that can be exploited by hackers. When vulnerabilities are discovered, hackers often develop exploits or programs that use the vulnerability to penetrate or disable a computer or a whole network. • Direct attacks can be from a disgruntled worker, an unhappy customer, a competitor or a curious hacker trying to penetrate your business network. • Viruses can do damage to a computer system and often spread over email contact lists and more recently over instant messaging networks, by disguising themselves as legitimate attachments. Users activate the code unknowingly, infecting their system or network with the virus, which often uses the victim’s address book to email themselves to other users. Viruses can range from merely annoying to extremely destructive and can be costly. Discounting costs associated with potential litigation and fines from credit card fraud, a business can also find itself bankrupt! According to industry expert Symantec, “93% of companies that lost their data for ten days filed for bankruptcy with one year...”. • Worms are similar to viruses and much more common. Unlike viruses, which infect programs and files, worms do not attach themselves to any other software and are self-sustained. One of the most Twelve Tips for Keeping your Computers and Networks Secure 1) Perhaps one of the most important ingredients of a secure network is awareness. Familiarize yourself with various security threats. 2) Update your operating systems and computer software regularly. 3) Purchase antivirus software to protect your computer from viruses, worms and Trojans. 4) Install an Internet firewall to prevent unauthorized Internet traffic from entering or leaving your computer. 5) Install spam blockers to minimize unwanted email content. 6) Purchase anti-spyware software to prevent the transmission of personal information from your computer. 7) Practice safe emailing and downloading. Most email viruses and spyware are spread by opening infected files. Never open a file unless you recognize the sender or are expecting the file. 8) Make regular back-ups of data. Plan ahead; don’t wait until disaster strikes to think about backing up documents, e-mails and other valuable business data. 9) Create secure and original passwords. This will ensure privacy and security. 10) Don’t share computer, email or network passwords with co-workers or friends. 11) Turn off your computer when not in use. The security of your computer cannot be breeched if the computer is powered off or if it is disconnected from the network. 12) Block non-work-related websites, use of instant messaging and file sharing programs.
  • 2. infamous worms was “My.Doom”, which, along with its variants, caused several billion dollars worth of damage to businesses, ISPs, and home users. • Trojan horses are software programs that capture passwords and other personal information, and which can also allow an unauthorized remote user to gain access to the system where the Trojan is installed. • Spam is not officially defined as a security threat, but it can seriously damage productivity and represents a potential risk due to the current rise of malicious software delivered by spam messages. One example of business threatening spam is “phishing” , a method used to acquire personal information such as passwords, bank account and credit card numbers and more through sophisticated email messages that claim to have come from a specific provider (eBay or PayPal for example) and appear quite authentic to the unsuspecting recipient. • Spyware are malicious programs sometimes found in freeware or shareware software, as well as in file sharing clients. They can take a toll on system and network performance and send user data to the spyware authors. • Inappropriate or illegal content are not considered a security threat, however there are severe consequences. If, for example, one of your employees shared an off-color joke with other employees, it could be considered “sexual harassment”, and that could mean litigation and fines. Basic Computer Protection Probably the easiest and most economical prevention a computer user can take to secure their company’s computers and networks is to exercise safe computing habits. Using good judgment when using the Internet for web surfing and visiting only well-known and trusted websites, being wary of email attachments or email from strangers and finally, knowing the capabilities and limitations of your computer and software applications are all good safeguards. The next step is to evaluate the risks and allocate the resources to securing your business computing and network investment. You should consider the harm that could be caused if a competitor retrieved customer information or if your business lost revenue due to website download. Don’t go overboard by investing time and money in resources you do not need. Consider outsourcing. Many ISPs offer security services for small as well as large networks but you may also want to consider a professional IT consultation, maintenance and repair business that tailors their offerings to small and medium-sized businesses. Article submitted by Laurie Breese, Owner of TeamLogic IT of Orland Park. TeamLogic IT of Orland Park, Illinois is part of a nationwide network of computer consultation and managed services businesses providing outsourced IT services. Small- to medium-sized businesses rely on TeamLogic IT to handle a broad range of services from urgent computer repair and proactive maintenance to the installation of entire networks and more. For more information, contact Laurie at lbreese@TeamLogicIT.com or visit www.TeamLogicIT.com./OrlandParkIL According to the SANS/Internet Storm Center the average time a “clean” (unpatched and undefended) system can be connected to the Internet before being attacked or scanned was an average of 20-30 minutes.