Search:

Monday | 5.21.2018
  Home  |  Current Issue  |  Subscribe Free  |  RSS News Feed   |  Sample Newsletter  |  Business Radio  |  Archives  |  Site Map
    February-2013  


Internet Security is Becoming a More Difficult Task Each Month

Everyday business activities generate repeated opportunities for hackers to breach the internet security of any small business.

These attacks can be in the form of spam, "phising" on financial data, malicious codes, loss of confidential data, and thefts of credit-card information are now a reality for most corporate businesses.

Large and small companies complain every year of millions of electronic attacks. Few companies though, especially small ones, can hire professional full-time IT specialists to combat such threats and protect their data.

Because information and information systems link every internal department and connect organizations with a variety of suppliers, partners and markets, they are vulnerable to outside attacks that can hurt clients and companies alike.

Symantec, a company that provides consulting services in IT security, addresses this issue in a list of tips in its annual Symantec Global Internet Security Threat Report. The update, along with preventive tips, summarizes attack data from around the world, such as on spam and phishing, and provides information on alerts to new threats found online.

Some of the tips from the report:

Tip No. 1. Credit-card information should be protected. It is always a hot commodity for every Internet thief.  Be sure to implement an integrated security solution as well as information-protection policies to safeguard financial data of the business and its customers. This includes bank and credit information stored on computers and mobile devices.

Tip No. 2. Protect personal devices to keep data safe. In order not to lose data and prevent a data breach, educate employees on the importance of protecting their mobile devices by avoiding leaving the devices lying around for others to pick up. Also, deploy technology that delivers a unified solution to discover, monitor and protect confidential data wherever it is stored or used.

Tip No. 3. Implement integrated-suite solutions and monitor all network-connected computers to protect browser-based applications. Traditional antivirus technology sometimes isn’t enough. Policies and employee education need to be coupled with an integrated solution to protect information wherever it is accessed—from servers to desktops and laptops/notebooks. In order to prevent virus infection, block intruders and protect privacy, and to stop malicious programs, monitor network-connected computers for signs of unauthorized entry and malicious activity.

Tip No. 4. Stop internet-related goods-and-services e-mail spam by deploying proper e-mail-security solutions. This includes spam-prevention actions that protect company reputation and manage risks:  Delete all spam and avoid clicking on suspicious links in email or IM messages; never open unknown e-mail attachments, and do not fill out forms in messages that ask for personal or financial information or passwords.

Tip No. 5. Be aware of hacking threats. Create and enforce policies that identify and restrict applications that can access the business’s network and ensure that employees follow best practices when they work remotely. Educate them that awareness of the risks and available safeguards are the first lines of defense for the security of information systems and networks, since technology alone cannot secure an organization.

For more information on how to secure a small business from Internet threats, visit the Symantec Web site, http://enterprise.symantec.com


© 2018, Information Strategies, Inc.
P.O. Box 315, Ridgefield, NJ 07657
201-242-0600