Page 43 - Cyber Warnings
P. 43
3. Limit employee access to systems - The fact that someone has established his or her
identity as an employee should not result in unfettered access to all your systems.
It’s important to work on the principle of least privilege to ensure employees only have
access to the services they really need for their role.
For example, an assistant in the admin team does not need administrative privileges on
IT systems; a member of the sales team does not need access to sensitive financial
information.
4. Use a Password Manager - One element that can be lacking particularly in smaller
businesses is security from the end user’s perspective in the form of a password policy
and password management.
Passwords are now so commonplace that people can become complacent with their
use. Repeated, simple and obvious passwords can open the door for hackers.
Ensure employees follow these five insider hacks for creating stronger passwords, and
use a Password Manager.
This allows users to store, manage and access all the systems they need with one
password, enabling companies to make their password requirements stronger, longer
and trickier for hackers to uncover.
5. Don’t forget Self-service - Password Self-service solutions allow end users to manage
their own accounts and systems access without needing to call the IT helpdesk.
So users can reset or unlock their password using multi-factor authentication. This
means security can be enhanced as organisations can enforce a strong password
policy.
6. Don’t worry about the cost – Free versions of security software will serve smaller
businesses’ needs and offer outstanding levels of protection at the same time. Many of
the solutions mentioned above – including Access Manager, Password Manager and
Self-service – can be downloaded free of charge, quickly and easily.
Visit websites such as Softonic, Hypersocket or Download to compare what’s available
from different software companies and find a product that best suits your needs.
43 Cyber Warnings E-Magazine – June 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide