Cyber security is often put to the side until it comes down to really needing it. There are several small security issues that don’t take much to fix, and these little changes can make it much harder for a hacker to gain access to your data. You don’t have to be a security expert to fix small security holes that can leave your network and data vulnerable to unauthorized users.
Check File and Directory Permissions
In enterprise applications, file and directory permissions should be locked down, especially if you allow guests on your network. With small businesses, these types of permission issues usually fall through the cracks. The small business setup allows everyone to share files with everyone on the network, so there is little security on files. As the business grows, the IT manager should place better restrictions on folders and files. The best way to manage this issue is moving files and folders to a server. The IT manager can then place permissions on one location instead of managing several different locations.
Pay Attention to VPN Connections
VPN clients can connect from anywhere in the world, so do you have some type of auditing system in place to figure out if any unauthorized machines are connecting? VPN and cyber security go hand-in-hand, because hackers will try to access your network through the VPN. Set up audits and periodically check IP addresses from where users are connecting. Block any suspicious IP addresses.
Disabled Security Software
On a Windows system, the end-user can disable the firewall and antivirus software. If you purchase an enterprise license, you can stop users from disabling important security software. This is especially important if users take home computers. They are able to connect to their home network, which means that they could obtain a virus while off of the corporate network. Always have cyber security software running such as an antivirus to detect any issues on user desktops and laptops.
Security on Backups
Backups are usually created and forgotten unless they are needed. Backups contain tons of information for a hacker, so you should be especially precautious with backup permissions. If a backup is no longer needed, you can delete it or store it on disk and off of the network. Always make sure that backups are stored in the most secured section of the network, because these files are what hackers want to use to gain access to sensitive data.
Install the Latest Security Patches
Regardless of what software you use, the software developer releases security updates to ensure that the latest security holes are secure. If you let server software, database software or other important software go un-patched, it can lead to it being breached. Always secure your important systems with the latest security patch from the manufacturer.
These are just five ways you can secure your systems better, but always perform audits and risk assessment to ensure that the latest hacks don’t make your systems vulnerable. For a good way to start your assessment, check out PCI compliance and what it means for your business.
Working on cyber-security? Have a look at what image-based backups can do to help.