Business Security Basics
It might sound like a no-brainer, but do you really know why information security is important? Have you considered that failing to care for your business’ information security can not only jeopardise customer confidence, it can also have a significantly negative impact on your finances?
Do you tend to ignore your security logs? Find out why security log management is important for small businesses and why it’s needed.
Cache poison, though it might sound like a humorous simile in today’s economy, it is actually a very malicious threat that no business owner should ignore. This article will teach you what DNS cache poisoning is and how it occurs.
For enhanced security, Microsoft operating systems allow you to customize security policies and group policies. Find out what your security options are and how to secure your workplace. While we’re on the topic of Microsoft, did you know that you can fine-tune the security controls of Windows Vista? Find out how to get the most out of Windows Vista and learn tips on how to tweak Vista’s security controls here.
“Have you evaluated your IT Department’s risk assessment strategy for cyber security? Do you feel lost and don’t know where to begin?” IT expert, Steve Mallard, provides us with information on a free guide from ANSI, which helps you calculate the financial impact of cyber security.
According to IT professional, Tom Olzak, security planning consists of three steps:
- Assigning Data Owners & Data Classification
- Data Storage & Sharing
- Developing a Security Strategy & Controls Design
Protecting Your Workplace from Malicious Threats
If you’d like some advice on how to strengthen end-user devices and servers from attack or how to avoid unintentional loss of sensitive information, this article on layered security is definitely worth the read.
Protecting desktop computers from accidental or intentional exploitation is fundamental for any business, of any size. Likewise, laptop protection is just as imperative. Though both of these security concerns require similar steps to protection, there are some differences. Find out what unique vulnerabilities laptops have and how to eliminate potential risks by clicking here.
What is encryption? How and why should you encrypt data? This encryption 101 article will provide you with the basics of encryption, offer tips on what information should be encrypted and provide you with recommendations for both free and paid-for encryption solutions.
Network Security & Access Control
Designing Network Security – This article will provide you with tips on what you should consider when implementing network security, both internally and externally. You will be provided with advice on what you should consider when designing a secure network as well as remote access solutions.
Once you’ve effectively secured your network, you’re going to need to designate who can access and control this information. This article on access control will get you on your way.
Business Security Management
If your business security is breached, do you have a plan? This article series on incident management will teach you how to plan and prepare for if the worst does happen, how to detect and analyze security incidents, how to contain a security threat in ways that will have as little impact as possible on your business, tips on how to eliminate security breaches and restore services, and post-recovery actions you and your business can take to ensure the security incidents will be prevented from occurring again in the future.
A standard I’m sure you have heard of by now is the Payment Card Industry Data Security Standard (PCI DSS). However, if you are just starting up a new business, PCI DSS is a standard that you must comply to if you intend to accept customer payments via credit card. It doesn’t matter what size of business you own, all merchants must be PCI compliant. Find out why PCI compliance is important and what the consequences are if you don’t meet the standards.