Do you wonder what happens on your business’ computer network during the night, or even in broad daylight? Network security and information protection are big issues for every business. Small business owners in particular feel increasingly lost and financially incapable of keeping their technology investment secure. However, there are a number of inexpensive technology solutions, and some common sense solutions, that help keep cents in your bank account. Business owners don’t have to lose sleep worrying about their computer networks.
Create Corporate Network Security Policies and Procedures
Cracking down on hackers has become an expensive business proposition. Computer-related crimes cost companies more than $24 billion per year, according to the American Society for Industry Security (ASIS). While businesses are experiencing a greater level of interconnectivity with customers and partners, the odds a computer thief will gain access to the company’s networks have drastically increased. Eliminating the threat isn’t impossible, but some common sense practices can help. One of the first steps to protection is determining exactly who is using your network. Each company should draft a security policy for its business network, including the company Web site, if updated in-house. In that policy, clarify who can use the network and when. Outline procedures for granting and revoking access so employees have a clear understanding. Also, with the workforce trend of telecommuting, companies need to address methods for remote log-ins.
Firewalls for Outside and Inside Threats
Hackers are infamous for logging in from remote locations, maliciously erasing imperative files, or at worst, using your network as a staging area for attacks on other computers. The popularity of cable modems and DSL now makes business networks especially vulnerable, since these faster lines are hooked directly to the Internet. Installing appropriately-sized firewalls can halt attacks. Most are sold based on the number of users in the company and are typically set up where the intranet (your internal network) meets the Internet (the external world wide web).
Adhering to your network security policy will be imperative in the long run. It’s unrealistic to think only outsiders will attack the network. Although the threat of internal attacks is quite real, it is also preventable. According to a NetVersant survey, 82 percent of all companies ignore or don’t fully comply with the company’s own network security policies and procedures. That means no matter how good the security system is, protection may be illusive. Firewalls can also be deployed to protect sensitive internal areas of the network, including financial and human resources systems. If you don’t have an internal firewall, you should seriously consider installing one to avoid insider threats.
A common mistake is to make the firewall investment, then walk away. The key to firewalls: after installation, is to continue your commitment through patch and firmware updates. Don’t install a firewall and never give a second thought to its maintenance. Installation and continuous maintenance are equally important.
Careless Usage
Unfortunately, internal and external hack attacks aren’t the only threats to a network. Careless user actions often damage networks. Accidentally erasing directories or accessing sensitive files can wreak havoc for those in charge of the network. A rule of thumb — give out only the minimum set of network permissions necessary for an employee to perform the job.
Email Management
While software designers have developed an email preview panel for ease of use and convenience, use of this feature presents an unneeded threat to your network security. Some computer viruses and worms are designed to attack as soon as an email message is viewed. Once highlighted, an infected email message, viewed only in the preview pane, inconspicuously opens the door for attack.
Web Browsers
Network administrators should also be mindful that Web browsers can invite network attacks. Even employees with good Web surfing intentions may open Web banners that can attack your network. Without the right security protection in place, your business is at risk.
Whether your business operates a five-user network or a 55-user network, serious consideration should be afforded to the idea of creating, implementing and enforcing a network security policy. And, if you’re feeling overwhelmed, of course, there are technology professionals who can assist you. Good luck, and don’t let the Web bugs bite!