Page 76 - CDM-Cyber-Warnings-March-2014
P. 76
Additionally, viruses, the scourge of our technology savvy world, can come from virtually anywhere: from the USB of an employee, from visiting divisive Web sites, from an employee’s laptop, quite literally anywhere. So, with this being said, check to see how well your antivirus software is working. It is important to answer the following question honestly; how prepared are you for virus prevention if your previous efforts fail? Here, the old saying fail to prepare, prepare to fail is most definitely appropriate. Efficient security settings ensure certain areas are protected or supported, everything from protecting systems in a proactive manner to reacting suitably to supposed occurrences. Gauge just how well your organization is performing, how well your actions are recorded, and how well your employee’s adhere to their assigned responsibilities. Contrary to many beliefs, an overly- complex password security policy can be counter-productive for an organization. Any policy that requires passwords be rotated regularly or needlessly (such as insisting on a mix of letters and numbers) can irritate staff and increase the probability of sedition. Employees may store their passwords in unsafe locations simply because they are incapable of remembering them. Additionally, your networks should be separated into public and private zones. Strictly private data should never have any relationship with the Internet or any other public network. Lastly, we look at encryption, an area that cannot be overlooked. All susceptible documents should be encrypted prior to hard drive storage. Encryption processes will be unsuccessful if they are too arduous for your users, so your files should be encrypted routinely and automatically by the preferred software of choice. About The Author John Glynn is 27 years old and comes from County Mayo, Ireland. He has been writing for the past 8 years. He enjoys to travel and keep fit. Education wise, he has a PhD in Behavioral and Social Psychology. He loves to write about various subjects including computers, networking and security. " # % " $ " # ! !
   71   72   73   74   75   76   77   78   79   80   81