Massive Top 100 security tips. Part V. Business continuality

Posted: 31/05/2012 in Uncategorized

  1. 1. Hacker often impersonate (spoofs) as internal users to gain company information. Make sure that your staff is aware of this threat.

    2. Make sure that you have qualified and trusty personal. Espionage happends in a wink of an eye.

    3. Talk with your personal to gain insight in the company.

    4. Keep your employees happy – even in hard times. Don’t make them and you became an victim of companies that bribe them for espionage.

    5. Be carefull what you post on social media.

    6. Create back-ups on a regular basis.

    7. Do your job. Let the system adminstrators, security experts and network specialists do their job. Don’t make them go lazy in an automated environment.

    8. Invest in security solutions and talk with your security advisors.

    9. Yes you can become a target of a cyber attack. Be aware of that.

    10. You wouldn’t leave your front door open, so why leave the front door open of your computer.

    11. Implement company rules.

    12. Life by the company rules.

    13. Hire security staff.

    14. Make sure you have a security policy in place -— The security policy is the formal statement of rules on how security will be implemented in your organization. A security policy should define the level of security and the roles and responsibilities of users, administrators and managers.

    15. Make sure all of your operating systems and applications are patched with the latest service packs and hotfixes -— Keeping your systems patched will close vulnerabilities that can be exploited by hackers.

    16. Turn off or remove unnecessary services.

    17. Identify what sensitive information you have, what you use it for and where it resides.

    18. Isolate/segregate sensitive data

    19. Encrypt sensitive data.

    20. Use Secure Sockets Layer (SSL) or a similarly secure connection for receiving or transmitting credit card information and other sensitive financial data.

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s