SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
6 Basic Steps for Better Security

Businesses of all sizes are vulnerable to security threats, and            Your service provider should offer anti-virus protection
new hazards seem to arise daily. Small and midsize business                 at the network level to neutralize threats before they
may have fewer resources for dealing with security threats,                 reach your inbox.
but no less responsibility for them. How do you reduce
the risk of data exposure, minimize vulnerabilities in your             4. Maintain a Firewall
network, ensure regulatory compliance and still maintain                  		A	firewall	is	particularly	crucial	when	your	Internet	
productive access to information?                                            connection is always on.
                                                                          		Your	firewall	establishes	a	protective	layer	between	
The best data security practices are often a mix of
                                                                             the outside world and your network to prevent
technologies and policies that ensure that those
                                                                             unauthorized access.
technologies are used correctly. Follow these six
                                                                          		Many	network	routers	include	a	firewall	as	part	
essential steps to help protect your business
                                                                             of the solution.
and improve productivity.

                                                                        5. Track Your Security Logs
1. Develop a Plan A clear, comprehensive
                                                                           Your network administrator should regularly review
    written security plan should cover:
                                                                             network access logs for unusual usage.
   The components of your network.
                                                                           Administrators should also set up reports to inform
   Standards to be used for data security, including virus
                                                                             business leaders when viruses, potential hackers or
  	 	 protection,	firewalls,	encryption,	intrusion	detection,	etc.
                                                                             other threats are blocked.
   Employee responsibilities regarding acceptable use of
      your network and the Internet.
                                                                        6. Educate Your Team on Security Threats
   How security breaches will be reported and handled.
                                                                          		Urge	employees	not	to	download	files	or	e-mail	
                                                                             attachments from people they don’t know and to be
2. Assess Risk
                                                                             wary of e-mails requesting sensitive information.
   Review your network and Internet connections
                                                                           Talk to your network administrator about using content
    to determine where you are most vulnerable to
                                                                             controls that monitor Web use.
    security threats.
                                                                           Educate employees on how to choose strong
   If needed, engage a security expert such as your
                                                                             passwords and remind them not to keep password
    network solution provider to conduct your security
                                                                             reminders near their computers.
    audit and make recommendations.
                                                                           Have your network administrator set computer
                                                                             log-ins so that the system suspends the log-in after
3. Protect Against Viruses, Spyware and Spam
                                                                             three unsuccessful attempts.
   Equip each computer on your network with anti-
  	 	 virus	software	so	that	all	files	are	scanned	and	
                                                                              Excerpted from the white paper “Best Practices for
      cleaned regularly.
                                                                              Better Security: Protecting Your Data and Eliminating
                                                                              Vulnerabilities.” Download the full white paper now.




                                                  ©2011 CenturyLink, Inc. All Rights Reserved.
    Not to be distributed or reproduced by anyone other than CenturyLink entities and CenturyLink Channel Alliance members. CM101247 07/11

Weitere ähnliche Inhalte

Mehr von Erik Ginalick

Unleashing The Power Of Customer Data Wp091047
Unleashing The Power Of Customer Data Wp091047Unleashing The Power Of Customer Data Wp091047
Unleashing The Power Of Customer Data Wp091047Erik Ginalick
 
Understand Benefits Of Electronic Health Records Wp091005
Understand Benefits Of Electronic Health Records Wp091005Understand Benefits Of Electronic Health Records Wp091005
Understand Benefits Of Electronic Health Records Wp091005Erik Ginalick
 
Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Erik Ginalick
 
Qmoe For Manufacturing Wp090862
Qmoe For Manufacturing Wp090862Qmoe For Manufacturing Wp090862
Qmoe For Manufacturing Wp090862Erik Ginalick
 
Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863Erik Ginalick
 
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194Erik Ginalick
 
The Worry Free Network Wp091050
The Worry Free Network Wp091050The Worry Free Network Wp091050
The Worry Free Network Wp091050Erik Ginalick
 
Qmoe For Financial Services Wp090860
Qmoe For Financial Services Wp090860Qmoe For Financial Services Wp090860
Qmoe For Financial Services Wp090860Erik Ginalick
 
Qmoe For Healthcare Wp090861
Qmoe For Healthcare Wp090861Qmoe For Healthcare Wp090861
Qmoe For Healthcare Wp090861Erik Ginalick
 
Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Erik Ginalick
 
Planning For Disaster And Everyday Threats Wp111438
Planning For Disaster And Everyday Threats Wp111438Planning For Disaster And Everyday Threats Wp111438
Planning For Disaster And Everyday Threats Wp111438Erik Ginalick
 
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094Erik Ginalick
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Erik Ginalick
 
Plan For Success White Paper
Plan For Success White PaperPlan For Success White Paper
Plan For Success White PaperErik Ginalick
 
Optimizing Your Communications In A Recession Wp090993
Optimizing Your Communications In A Recession Wp090993Optimizing Your Communications In A Recession Wp090993
Optimizing Your Communications In A Recession Wp090993Erik Ginalick
 
Is Cloud Computing Right For You Wp101305
Is Cloud Computing Right For You Wp101305Is Cloud Computing Right For You Wp101305
Is Cloud Computing Right For You Wp101305Erik Ginalick
 
Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504Erik Ginalick
 
Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504Erik Ginalick
 
Infrastructures For Innovation Wp090974
Infrastructures For Innovation Wp090974Infrastructures For Innovation Wp090974
Infrastructures For Innovation Wp090974Erik Ginalick
 
Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118Erik Ginalick
 

Mehr von Erik Ginalick (20)

Unleashing The Power Of Customer Data Wp091047
Unleashing The Power Of Customer Data Wp091047Unleashing The Power Of Customer Data Wp091047
Unleashing The Power Of Customer Data Wp091047
 
Understand Benefits Of Electronic Health Records Wp091005
Understand Benefits Of Electronic Health Records Wp091005Understand Benefits Of Electronic Health Records Wp091005
Understand Benefits Of Electronic Health Records Wp091005
 
Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366
 
Qmoe For Manufacturing Wp090862
Qmoe For Manufacturing Wp090862Qmoe For Manufacturing Wp090862
Qmoe For Manufacturing Wp090862
 
Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863Qmoe For Public Sector Wp090863
Qmoe For Public Sector Wp090863
 
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
Sip Trunk Services The Cornerstone Of Unified Communications Wp101194
 
The Worry Free Network Wp091050
The Worry Free Network Wp091050The Worry Free Network Wp091050
The Worry Free Network Wp091050
 
Qmoe For Financial Services Wp090860
Qmoe For Financial Services Wp090860Qmoe For Financial Services Wp090860
Qmoe For Financial Services Wp090860
 
Qmoe For Healthcare Wp090861
Qmoe For Healthcare Wp090861Qmoe For Healthcare Wp090861
Qmoe For Healthcare Wp090861
 
Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010
 
Planning For Disaster And Everyday Threats Wp111438
Planning For Disaster And Everyday Threats Wp111438Planning For Disaster And Everyday Threats Wp111438
Planning For Disaster And Everyday Threats Wp111438
 
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 
Plan For Success White Paper
Plan For Success White PaperPlan For Success White Paper
Plan For Success White Paper
 
Optimizing Your Communications In A Recession Wp090993
Optimizing Your Communications In A Recession Wp090993Optimizing Your Communications In A Recession Wp090993
Optimizing Your Communications In A Recession Wp090993
 
Is Cloud Computing Right For You Wp101305
Is Cloud Computing Right For You Wp101305Is Cloud Computing Right For You Wp101305
Is Cloud Computing Right For You Wp101305
 
Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504
 
Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504
 
Infrastructures For Innovation Wp090974
Infrastructures For Innovation Wp090974Infrastructures For Innovation Wp090974
Infrastructures For Innovation Wp090974
 
Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118
 

Six Basic Steps For Better Security Cm101247

  • 1. 6 Basic Steps for Better Security Businesses of all sizes are vulnerable to security threats, and  Your service provider should offer anti-virus protection new hazards seem to arise daily. Small and midsize business at the network level to neutralize threats before they may have fewer resources for dealing with security threats, reach your inbox. but no less responsibility for them. How do you reduce the risk of data exposure, minimize vulnerabilities in your 4. Maintain a Firewall network, ensure regulatory compliance and still maintain  A firewall is particularly crucial when your Internet productive access to information? connection is always on.  Your firewall establishes a protective layer between The best data security practices are often a mix of the outside world and your network to prevent technologies and policies that ensure that those unauthorized access. technologies are used correctly. Follow these six  Many network routers include a firewall as part essential steps to help protect your business of the solution. and improve productivity. 5. Track Your Security Logs 1. Develop a Plan A clear, comprehensive  Your network administrator should regularly review written security plan should cover: network access logs for unusual usage.  The components of your network.  Administrators should also set up reports to inform  Standards to be used for data security, including virus business leaders when viruses, potential hackers or protection, firewalls, encryption, intrusion detection, etc. other threats are blocked.  Employee responsibilities regarding acceptable use of your network and the Internet. 6. Educate Your Team on Security Threats  How security breaches will be reported and handled.  Urge employees not to download files or e-mail attachments from people they don’t know and to be 2. Assess Risk wary of e-mails requesting sensitive information.  Review your network and Internet connections  Talk to your network administrator about using content to determine where you are most vulnerable to controls that monitor Web use. security threats.  Educate employees on how to choose strong  If needed, engage a security expert such as your passwords and remind them not to keep password network solution provider to conduct your security reminders near their computers. audit and make recommendations.  Have your network administrator set computer log-ins so that the system suspends the log-in after 3. Protect Against Viruses, Spyware and Spam three unsuccessful attempts.  Equip each computer on your network with anti- virus software so that all files are scanned and Excerpted from the white paper “Best Practices for cleaned regularly. Better Security: Protecting Your Data and Eliminating Vulnerabilities.” Download the full white paper now. ©2011 CenturyLink, Inc. All Rights Reserved. Not to be distributed or reproduced by anyone other than CenturyLink entities and CenturyLink Channel Alliance members. CM101247 07/11