Username: Save?
Password:
Home Forum Links Search Login Register*
    News: Welcome to the TechnoWorldInc! Community!
Recent Updates
[April 24, 2024, 11:48:22 AM]

[April 24, 2024, 11:48:22 AM]

[April 24, 2024, 11:48:22 AM]

[April 24, 2024, 11:48:22 AM]

[April 03, 2024, 06:11:00 PM]

[April 03, 2024, 06:11:00 PM]

[April 03, 2024, 06:11:00 PM]

[April 03, 2024, 06:11:00 PM]

[March 06, 2024, 02:45:27 PM]

[March 06, 2024, 02:45:27 PM]

[March 06, 2024, 02:45:27 PM]

[March 06, 2024, 02:45:27 PM]

[February 14, 2024, 02:00:39 PM]
Subscriptions
Get Latest Tech Updates For Free!
Resources
   Travelikers
   Funistan
   PrettyGalz
   Techlap
   FreeThemes
   Videsta
   Glamistan
   BachatMela
   GlamGalz
   Techzug
   Vidsage
   Funzug
   WorldHostInc
   Funfani
   FilmyMama
   Uploaded.Tech
   MegaPixelShop
   Netens
   Funotic
   FreeJobsInc
   FilesPark
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
+ Techno World Inc - The Best Technical Encyclopedia Online! » Forum » THE TECHNO CLUB [ TECHNOWORLDINC.COM ] » Ethical Hacking / Security / Viruses » Viruses
 Information Security Policy
Pages: [1]   Go Down
  Print  
Author Topic: Information Security Policy  (Read 1007 times)
Daniel Franklin
TWI Hero
**********


Karma: 3
Offline Offline

Posts: 16647


View Profile Email
Information Security Policy
« Posted: October 02, 2007, 12:43:43 PM »


Businesses that do not have clearly written Information Technology security policies and practices in place run the risk of being named in legal actions in the very near future. Although no current court cases exist, many security experts are warning that if you lose or expose confidential business or customer data, unknowingly distribute viruses or experience a breach of your systems that results in loss of service to your customers, you could be found liable. Computer and network security used to be the concern of only the largest corporations. Now, however, with the high availability of networks, web hosting and Internet applications to even the smallest office, the tide is turning. Today, a small business with two employees can construct an economical network, share a cable modem and purchase a firewall, which enables remote access using a Virtual Private Network (VPN). This is also a double-edged sword. This new "high availability" has also born a vast breed of crackers.* These individuals can find ways to access, steal and/or destroy data residing on public and private networks. Starting th Process The key to establishing these policies and practices is to not be overwhelmed by the complexity of the process. Start by taking inventory of your systems, connections to the Internet and external providers, the method in which you store data and the method in which you secure and backup data. During this documentation process, you can identify clear procedures for the handling and transfer of this data, as well as new security measures you can use to show due diligence in addressing any potential security risks. The Basics Even the smallest network should adhere to the following: <sum>Never use a computer system for both personal and business use (i.e. family uses for fun, but business is also processed on the machine).

This is an immediate risk to public disclosure of confidential information and accidental loss of data. Back to Top<sum>A daily and monthly data backup process should exist which also provides for off-site or fireproof storage of the backup data in a non-editable format (i.e. offline magnetic tape or CD-R (not CD-RW)). <sum>Any connection to the Internet, from a shared 56 K modem to a broadband (DSL, Cable or T1) connection, should be behind a software or hardware-based firewall. If not, this is an immediate and gaping hole through which crackers can access your private network or use your computer for an attack on a larger public or private network (often called a DDOS or Distributed Denial of Service attack). <sum>Use a password to login to your computer even if it is not on a network. Passwords should be at least eight characters and changed as often as tolerable (90 days is a satisfactory time period). <sum>Use and update daily an anti-virus software suite, which can protect your individual computers as well as any servers you use. By taking these steps, you are dramatically reducing your exposure to uninvited intrusions. The inventory you established earlier can then be reviewed and a plan can be developed by your business and your technology staff/consultant to ensure your office network and data is a fortress with a little risk as possible. Learn More About Securing Your Computer, Data and Network

Security Tracker This site tracks all known vulnerabilities and threats in Internet and network technology. http://securitytracker.com Microsoft Security Micorsoft's site dedicated to their own applications, including software patches and alerts to newly discovered security issues. http://www.microsoft.com/security/default.asp TinHat The ABCs of web and Internet Security. http://www.tinhat.com/

Articles Source - Free Articles

About the Author

Prior to participating in the founding of BMRW & Associates, Blane served most recently as the Director of Technology for VESTAX Securities Corporation. In this capacity he was responsible for the management and evolution of the IT infrastructure and services for internal operations and field technology services for VESTAX financial advisors.

Blane brings substantial knowledge in application & data integration, mining and management .

Logged

Pages: [1]   Go Up
  Print  
 
Jump to:  

Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.125 seconds with 24 queries.