SlideShare a Scribd company logo
1 of 12
Computer & Information Security – IT & Network Support – Security Auditing & Consulting




            IT Security Basics
   for Medium-Sized Businesses & Organizations



      Some of the things you need to know
       in order to keep your network and
                computers secure



                                                                             www.scwoa.com
                                                                  Follow us on Twitter – Like us on Facebook
                                                                          Sign up on our website for updates
Computer & Information Security – IT & Network Support – Security Auditing & Consulting




            Start with the Physical
• Use a surge suppressor on ALL computers
• Use a UPS (Uninterruptable Power Supply) on
  all Critical Systems
• If you are connected to a land line – your network
  components (e.g. modems) are more sensitive to power
  surges through the phone line than power lines
• Surge / UPS protection is especially critical in areas with
  anything less than a perfect power supply i.e. all CA
  businesses should have such protection

                                                                                www.scwoa.com
                                                                     Follow us on Twitter – Like us on Facebook
                                                                             Sign up on our website for updates
Computer & Information Security – IT & Network Support – Security Auditing & Consulting




      More Physical Necessities
• Install locks on accessible but attended
  machines
• Install locks and alarms on unattended
  machines e.g. smoke alarms, power sensors
• Keep rooms locked if feasible e.g. your server
  room or wherever sensitive data is stored


                                                                               www.scwoa.com
                                                                    Follow us on Twitter – Like us on Facebook
                                                                            Sign up on our website for updates
Computer & Information Security – IT & Network Support – Security Auditing & Consulting




       Backups Will Set You Free
• Backup your files – on all computers
• Setup an automated backup system to do this
  for you every day (easiest solution)
• Store backups offsite – or at least periodically
  transfer backups offsite
• If you think this is a waste of resources – imagine what will happen
  if you lose ALL your files through one unlucky accident



                                                                                www.scwoa.com
                                                                     Follow us on Twitter – Like us on Facebook
                                                                             Sign up on our website for updates
Computer & Information Security – IT & Network Support – Security Auditing & Consulting




          Updates Keep You Safe
• Make sure you receive alerts regarding updates /
  patches for ALL the software you use.
• Make sure that you ALWAYS have the latest patch
  / update for all your software (especially the OS)
• Run the occasional security audit to make sure
  that everyone is using the updated software
• Updates / patches remove known security flaws –
  this is why older software is less secure
                                                                               www.scwoa.com
                                                                    Follow us on Twitter – Like us on Facebook
                                                                            Sign up on our website for updates
Computer & Information Security – IT & Network Support – Security Auditing & Consulting




Enforce Good Password Policies
• Create a good password policy and enforce it
• Use password aging to make sure passwords
  are changed periodically
• Establish rules that enforce the use of good
  passwords
• Try adopting passphrases
• Enforce the use of Capitals, numb3rs, and
  $pecial characters
                                                                               www.scwoa.com
                                                                    Follow us on Twitter – Like us on Facebook
                                                                            Sign up on our website for updates
Computer & Information Security – IT & Network Support – Security Auditing & Consulting




 Manage User Accounts Diligently
• Make sure old accounts are removed
• Ensure that access privileges are appropriate
• Protect administrator / super-user accounts
  with the utmost care
• Establish clear audit trails to track access
  through any account


                                                                               www.scwoa.com
                                                                    Follow us on Twitter – Like us on Facebook
                                                                            Sign up on our website for updates
Computer & Information Security – IT & Network Support – Security Auditing & Consulting




  Run Periodic Security Checks
• Make sure your systems are updated and
  patched with the latest available versions
• Run periodic virus / malware scans
• Check suspicious network activity (or call a
  professional if you find something suspicious)



                                                                               www.scwoa.com
                                                                    Follow us on Twitter – Like us on Facebook
                                                                            Sign up on our website for updates
Computer & Information Security – IT & Network Support – Security Auditing & Consulting




 Run Quarterly Security Audits
• Check your network is not exposed to well known
  exploits / security flaws
• Make sure your firewall is secure and updated
• Test security integrity against popular hacking
  tools
• Ensure that you comply with all legal
  requirements e.g. HIPAA, PCI DSS, Sarbanes Oxley
• Be certain that security integrity has not been
  affected by changes to your system e.g. new
  users / data
                                                                               www.scwoa.com
                                                                    Follow us on Twitter – Like us on Facebook
                                                                            Sign up on our website for updates
Computer & Information Security – IT & Network Support – Security Auditing & Consulting




 Encrypt Your Files (& Emails)
• Files should always be encrypted if they
  contain sensitive information
• Use secure servers if you need to receive /
  share sensitive data e.g. credit card numbers
• Use encrypted software when someone might
  have a reason to want to see, forge, or alter
  email messages.

                                                                               www.scwoa.com
                                                                    Follow us on Twitter – Like us on Facebook
                                                                            Sign up on our website for updates
Computer & Information Security – IT & Network Support – Security Auditing & Consulting




               Hire a “Tiger Team”
• Tiger Teams are groups of honest hackers that
  you hire to break into your system
• The purpose analyze and demonstrate flaws in
  your security system and policies (if present)
• This is generally done by organizations with
  extremely sensitive data e.g. banks


                                                                               www.scwoa.com
                                                                    Follow us on Twitter – Like us on Facebook
                                                                            Sign up on our website for updates
Computer & Information Security – IT & Network Support – Security Auditing & Consulting



   Hire a Computer / Information
         Security Specialist
• If in doubt, ask a professional
• A computer / information security specialist
  will secure your system better, and faster than
  a non-specialized technician
• A security specialist will be aware of all the
  latest issues and how to fix them BEFORE they
  can become an issue


                                                                               www.scwoa.com
                                                                    Follow us on Twitter – Like us on Facebook
                                                                            Sign up on our website for updates

More Related Content

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

SCWOA - Computer and Information Security Basics

  • 1. Computer & Information Security – IT & Network Support – Security Auditing & Consulting IT Security Basics for Medium-Sized Businesses & Organizations Some of the things you need to know in order to keep your network and computers secure www.scwoa.com Follow us on Twitter – Like us on Facebook Sign up on our website for updates
  • 2. Computer & Information Security – IT & Network Support – Security Auditing & Consulting Start with the Physical • Use a surge suppressor on ALL computers • Use a UPS (Uninterruptable Power Supply) on all Critical Systems • If you are connected to a land line – your network components (e.g. modems) are more sensitive to power surges through the phone line than power lines • Surge / UPS protection is especially critical in areas with anything less than a perfect power supply i.e. all CA businesses should have such protection www.scwoa.com Follow us on Twitter – Like us on Facebook Sign up on our website for updates
  • 3. Computer & Information Security – IT & Network Support – Security Auditing & Consulting More Physical Necessities • Install locks on accessible but attended machines • Install locks and alarms on unattended machines e.g. smoke alarms, power sensors • Keep rooms locked if feasible e.g. your server room or wherever sensitive data is stored www.scwoa.com Follow us on Twitter – Like us on Facebook Sign up on our website for updates
  • 4. Computer & Information Security – IT & Network Support – Security Auditing & Consulting Backups Will Set You Free • Backup your files – on all computers • Setup an automated backup system to do this for you every day (easiest solution) • Store backups offsite – or at least periodically transfer backups offsite • If you think this is a waste of resources – imagine what will happen if you lose ALL your files through one unlucky accident www.scwoa.com Follow us on Twitter – Like us on Facebook Sign up on our website for updates
  • 5. Computer & Information Security – IT & Network Support – Security Auditing & Consulting Updates Keep You Safe • Make sure you receive alerts regarding updates / patches for ALL the software you use. • Make sure that you ALWAYS have the latest patch / update for all your software (especially the OS) • Run the occasional security audit to make sure that everyone is using the updated software • Updates / patches remove known security flaws – this is why older software is less secure www.scwoa.com Follow us on Twitter – Like us on Facebook Sign up on our website for updates
  • 6. Computer & Information Security – IT & Network Support – Security Auditing & Consulting Enforce Good Password Policies • Create a good password policy and enforce it • Use password aging to make sure passwords are changed periodically • Establish rules that enforce the use of good passwords • Try adopting passphrases • Enforce the use of Capitals, numb3rs, and $pecial characters www.scwoa.com Follow us on Twitter – Like us on Facebook Sign up on our website for updates
  • 7. Computer & Information Security – IT & Network Support – Security Auditing & Consulting Manage User Accounts Diligently • Make sure old accounts are removed • Ensure that access privileges are appropriate • Protect administrator / super-user accounts with the utmost care • Establish clear audit trails to track access through any account www.scwoa.com Follow us on Twitter – Like us on Facebook Sign up on our website for updates
  • 8. Computer & Information Security – IT & Network Support – Security Auditing & Consulting Run Periodic Security Checks • Make sure your systems are updated and patched with the latest available versions • Run periodic virus / malware scans • Check suspicious network activity (or call a professional if you find something suspicious) www.scwoa.com Follow us on Twitter – Like us on Facebook Sign up on our website for updates
  • 9. Computer & Information Security – IT & Network Support – Security Auditing & Consulting Run Quarterly Security Audits • Check your network is not exposed to well known exploits / security flaws • Make sure your firewall is secure and updated • Test security integrity against popular hacking tools • Ensure that you comply with all legal requirements e.g. HIPAA, PCI DSS, Sarbanes Oxley • Be certain that security integrity has not been affected by changes to your system e.g. new users / data www.scwoa.com Follow us on Twitter – Like us on Facebook Sign up on our website for updates
  • 10. Computer & Information Security – IT & Network Support – Security Auditing & Consulting Encrypt Your Files (& Emails) • Files should always be encrypted if they contain sensitive information • Use secure servers if you need to receive / share sensitive data e.g. credit card numbers • Use encrypted software when someone might have a reason to want to see, forge, or alter email messages. www.scwoa.com Follow us on Twitter – Like us on Facebook Sign up on our website for updates
  • 11. Computer & Information Security – IT & Network Support – Security Auditing & Consulting Hire a “Tiger Team” • Tiger Teams are groups of honest hackers that you hire to break into your system • The purpose analyze and demonstrate flaws in your security system and policies (if present) • This is generally done by organizations with extremely sensitive data e.g. banks www.scwoa.com Follow us on Twitter – Like us on Facebook Sign up on our website for updates
  • 12. Computer & Information Security – IT & Network Support – Security Auditing & Consulting Hire a Computer / Information Security Specialist • If in doubt, ask a professional • A computer / information security specialist will secure your system better, and faster than a non-specialized technician • A security specialist will be aware of all the latest issues and how to fix them BEFORE they can become an issue www.scwoa.com Follow us on Twitter – Like us on Facebook Sign up on our website for updates