Computer Security & IT Defence – Part 2

Computer Security & IT Defence Part 2

In October we spoke about the layers of physical security needed to defend your data and business integrity fully.

Today we will look at to human aspects of network defences. Human error is responsible for around 95% of security incidences.

Here are a few ways hackers can exploit human vulnerabilities:

  • Guessing and solving passwords
  • Tricking staff members into opening infected emails
  • Luring employees to visit compromised websites
  • Getting your employees to divulge sensitive information

For successful computer security when dealing with the human layer, you must:

  • Have a mandatory password change every 30 – 60 days
  • Share sensitive information with only those who need to know
  • Keep a lookout for suspicious behaviour
  • Make it a requirement for two or more people to have to sign off on the transfer of funds
  • Retrain your employees on computer security practices regularly

By far the most common area for attacks is the network layer. This refers to software attacks delivered online.

There are many kinds of malware; Some are designed to spy on you, some to siphon funds and some to access files. Most of which are transmitted the same way:

  • Downloads
  • Visiting compromised sites
  • Opening spam emails

For protection against malware:

  1. Don’t let any foreign devices onto your Wi-Fi network
  2. Have an isolated Wi-Fi network if you are required to have third-party access
  3. Don’t use your business’s devices on any unsecured networks
  4. Use firewalls
  5. Use encrypted Wi-Fi networks
  6. Change your Wi-Fi password regularly
  7. Use programs that detect suspicious behaviour with your software
  8. Use and update antivirus software

The mobile layer refers to any mobile devices used by your business

There are a few common angles for compromising devices:

  • Downloaded malware
  • Infected apps
  • Network threats

To Help protect your mobile devices:

  • Limit access to trusted employees only
  • Use secure passwords or PIN codes
  • Have your devices encrypted
  • Use only reputable security apps

If you need help with your computer security, give us a call at Advanced Technology.

Passwords on Sticky Notes - The Road to Hell
Passwords on Sticky Notes = The Road to Hell?
The 3 Top Reasons for Data Loss
The 3 Top Reasons for Losing Data
Network Security - What Every Small Business Needs to Know
Network Security – What Every Small Business Needs to Know
Business Security Means a 24-7 Security Operations Centre
Business Security Means a 24/7 Security Operations Centre