IT Security Best Practices: Quick Tips to Help Secure Your Network
Cyberattacks are on the rise. Phishing, Malware, Ransomware, Password Breaches & Denial of Service Attacks have changed in design and grown in complexity, so there’s no better time to refresh on some basic best practices to secure your network.
Password Protection
- Ensure that your password is a minimum of 8 characters that include a combination of capitals, numbers and symbols.
- Do not share your password with anyone including co-workers. Passwords are for your personal usage only.
- Never share your User Name and Password with anyone online or electronically. Partner companies and responsible e-tailers will never ask for this information. This should be a red-light if the request is made.
- Do not re-use passwords and/or leave documentation of your passwords in visible sight.
- When updating your password, refrain from using the same password with a slight difference. For example, money1 should not be replaced by money2.
- It is also important to have a unique password for all aspects of the network to best avoid Phishing schemes.
Remote Access
- Do not access the corporate network remotely in an insecure manner. This includes:
- Connecting with a workstation that you know to have a virus
- Connecting with a workstation that does not have functioning antivirus
- Utilizing counterfeit or illegally obtained software to access the corporate network
- Using flash-based media (i.e., memory sticks or sd cards) without having previously scanned them for external threats
- Be cautious of unsecure wireless networks and public terminals usually found in business centers, hotels, airports, etc. while traveling.
Suspicious Email
- Do not open and click on links received from suspicious senders. Beware as Phishing emails are made to look genuine; they may appear to come from Amazon, popular banks, the IRS and even the Better Business Bureau.
Spyware and Malware
- Spyware and Malware are a big threat to all companies and individuals today. These items are spread via web usage. Refrain from downloading pictures and files from “questionable” pictures and music-sharing file sites.
As a precaution, we recommend that no personal pictures, music, or videos be saved or downloaded on company hardware.
For more on information security best practices and educating your organization on cybersecurity watch this recorded webcast to learn what your organization can do to minimize the risk of a cyberattack: CyberSecurity and Establishing a Cyber SMART Work Environment