Protecting The Network – A few basics

Network security consists of not only the various hardware and software components, but also the numerous related policies and procedures. These are envisaged by IT Support Manhattan Experts in order to deal with threats, both internal and external to your organization’s computer systems.

Cyber criminals, disgruntled employees (both current and former) and careless users can compromise your computer networks and part with critical data. Multiple layers of hardware and software can be a way to prevent threats to your networks, and hinder them from spreading further if and when they slip past your defenses.

Run updates and patches regularly

Cyber criminals routinely exploit vulnerabilities in the OS, software applications, web browsers and browser plug-ins. This can be critical if administrators are lax about maintaining patches and updates.

Make doubly sure that your Windows and Apple systems have automatic updating enabled. Maintain an inventory to ensure that each and every device is updated on a regular basis, including mobile gadgets and network components. It would also be good to verify that your office systems are having the up-to-date versions of these commonly used programs:

  • Microsoft Internet Explorer
  • Microsoft Office Suite
  • Adobe Acrobat and Reader
  • Adobe Flash
  • Oracle Java

 

Secure passwords

By now, most of us know not to leave crucial passwords on Post-It Notes plastered to the monitor. But there’s more to maintaining security than merely hiding them from plain sight. A strong password is one that’s difficult to detect for humans and computers, is at least 6 characters or more in length, which combines upper- and lower-case letters, numbers and special characters.

Here are a few additional suggestions:

  • Never use any common words or phrases. These include proper nouns and foreign words.
  • Take care not to use anything even remotely related to yourself, your family members or even pets.
  • Avoid numbers others could easily access like birthdays, anniversaries, phone numbers and street or house numbers.
  • Coin a phrase that means something to you, use up the first letters of each word and mix them up or insert some characters.

It is recommended that passwords be changed at least every 90 days. It’s also wise not to reuse any of the last 15 passwords. A good security policy suggests that users be prevented access for some time after say five continuous failed login attempts.

Members of the organization should be made aware of social engineering techniques commonly used to get us to divulge our passwords. It’s a common tactic for hackers to impersonate tech support personnel in order to get people to part with their passwords. Or simply look over one’s shoulders while they type in their password.

Some additional tips:

Utilize cloud-based email and file sharing services instead of a VPN.

Design and deploy user-access policies. Exercise caution when granting access and privileges to employees, business partners or contractors.

Ensure that all members know how to secure their devices and home networks. There are increasing incidents of malicious software infecting the networks at work via personal devices or systems used at home.

While allowing mobile devices access to networks, they should be checked for up-to-date security software.

Related Post: Managed Service Providers – Key to Your Future Growth

Back to Blog

Share:

Related Posts

How to Protect Your Computer From Viruses and Malware

Even the most diligent of computer users run the risk of picking…

Read More

How you benefit from IT Managed Services

There are several concrete benefits to be gained through outsourcing IT Managed…

Read More

Security Advantages that Managed IT Services Provide Businesses

Outsourcing the management of your network or remotely Managed Tech Services Manhattan,…

Read More