Skip navigation


12 Key steps to Internet Security

  1. Your approach to internet security should begin with a risk assessment. If you don’t know what threats are likely to be posed to your IT systems and networks, and their potential effects on your business should they occur, then you are not really in a position to put in place a series of measures to counter these threats.
  2. An effective anti-virus solution is absolutely fundamental to the security of any computer network.
  3. Equally, a firewall is one of the most basic security mechanisms and should form an integral part of your internet security defences.
  4. However, anti-virus solutions and firewalls are only of value if they are regularly updated. The range and scale of internet-threats is constantly changing and in order to address these it is vital that you ensure your anti-virus software and firewalls are fully patched and up-to-date. Ideally this should be carried out automatically in background mode.
  5. Authentication provides an effective means of ensuring that only the people you want to have access to your computer network are actually allowed to do so. There are a range of different levels of sophistication, so you need to select the authentication solution that is the most appropriate for the particular needs of your business.
  6. Bear in mind the need to provide secure access for your remote workers. A security defence is only as strong as its weakest link and any remote weaknesses can, and will, be fully exploited by attackers.
  7. Wireless technologies pose serious security threats unless they are effectively managed. Consider the use of encrypted VPNs to address these issues.
  8. Encryption is a growing requirement, particularly with the number of laptops now containing confidential or sensitive information. Even if you are just starting to use encryption, you should look to develop a staged implementation based around a unified encryption management approach.
  9. Spam can be managed effectively through the use of anti-spam solutions. Outsourcing spam management is an option but take account of your need for control and effective reporting, if you opt for this solution.
  10. Unified threat management systems now provide a range of security solutions in an integrated product. Whilst these can offer significant cost savings, you should bear in mind that if anything goes wrong, you will lose all your security functions at once, so a failsafe arrangement with a spare device is recommended.
  11. Penetration testing can be a useful means of checking how secure your corporate networks are and identifying points of potential weakness.
  12. Finally, remember the ‘people’ factor. No matter how good the technical countermeasures you put in place, your security will only be as good as the users tasked with making these work. So, ensure that they are aware of your security policies and committed to enforcing them, and reinforce this with top management support.

Source: http://complianceandprivacy.com/News-Wick-Hill-12-steps-to-internet-security.html

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: