www.1001TopWords.com |
Small Business Computer Security, the Basics
Anyone in business today realizes both the natural dependency on computers in the workplace, and also the potential dangers associated with storing important data on them. Today's business owners are constantly being reminded that their company's data is at risk by the daily reports on various news stations, or even their favorite business-related website. But what can a typical small business owner do to protect their network from these threats that are broadcasted in so many ways? Dangers lurk at every turn on the Internet. There are thousands of attacks or areas of security that could be discussed, but I am going to try and focus on three general nuisances associated with today's computers: viruses, spy-ware, and traditional "hackers" that will intentionally try to exploit your computer systems for various reasons. All of these attacks, although different, serve a specific purpose for the attacker, yet basically translate into three things for a business: lost productivity, lost data, and the end result? lost money. Here is brief descriptions of what the aforementioned attacks are, consist of, and what a typical small business can do to protect their technology investments. Virus: A computer virus shares some traits with an actual virus that gets people sick. A computer virus must piggyback on top of some other program or document in order to get executed. Once it is running, it is then able to infect other programs or documents. Obviously, the analogy between computer and biological viruses stretches things a bit, but there are enough similarities that the name sticks. A computer virus can have many intentions. One common goal is the virus's desire to infect as many machines as possible. Some are harmless and are no more then an attempt for a hacker to spread their name and get recognition amongst their peers. However, this can still lead to slow computer performance or programs acting up. On the other side of the coin, viruses can be extremely harmful and delete data, cause complete computer interruption, give someone unauthorized access to your company data, or even be used in conjunction with thousands of other infected computers to launch grand-scale attacks. Viruses are still mostly transferred via email; however newer attacks will entice you via an email to a malicious website that will exploit a flaw in your computer to install the virus. Protection from Viruses: If you are reading this article, and you still do not have current (this is very important) anti-virus software running on EVERY single computer you own, then shame on you. With all of the marketing commotion that surrounds viruses, you should already have antivirus software on all of your computers. If you don't, then hurry to the store and purchase it. Popular software in the antivirus market is made by Symantec (www.symantec.com) and McAfee (www.mcafee.com). Larger companies may look into a system that will scan emails prior to the email getting to a user's inbox for viruses. Also, be wary of what you open in your email. Do not open emails from people you do not know, and even if you do know the sender, take extra caution, as most viruses today will trick you into believing that the virus is sent from someone that you know. Spyware: You may know spyware by one of its many names, adware, malware, trackware, scumware, thiefware, snoopware, and sneakware. Because of its stealthy nature, most Internet users are more familiar with the symptoms of spyware infection: sluggish PC performance, increased pop-up ads, unexplained homepage change, and mysterious search results. For virtually everyone surfing the Internet, malware and adware are a nuisance, but if you do not detect spyware on your PC, it can lead to much more serious consequences such as identity theft. Many people wonder how they get spyware installed onto their computer in the first place. Typically, spyware is installed onto your PC without your knowledge because the programs are usually hidden within other software. For example, when you are browsing a website, and a pop-up appears to install the latest online Casino game, it probably will give you that game, but you've also just installed spyware along with that. Another avenue for Spyware to infect your machine is through popular Peer-to-Peer File Sharing software such as Kazaa. The financial impact on a business that is plagued by spyware can toll very high. Costs paid to computer consultants to remove spyware, and a user's overall lost of productivity from a slow-performing computer can add up very quickly. Protection from Spyware: Spyware is a huge problem in today's computing environment. Fighting Spyware starts with smarter use of your computer. The best defense against spyware and other unwanted software is not to download it in the first place. Here are a few helpful tips that can protect you from downloading software you don't want. Only download programs from web sites you trust, read all security warnings, license agreements, and privacy statements associated with any software you download, and never click "agree" or "OK" to close a window. Instead, click the red "x" in the corner of the window or press the Alt + F4 buttons on your keyboard to close a window, and be wary of popular "free" music and movie file-sharing programs, and be sure you clearly understand all of the software packaged with those programs. If you do happen to install Spyware on your computer, there are some tools available to assist in the removal of spyware. Be careful however when downloading these "free" spyware removal softwares, as even some of the removal tools incorporate spyware into their software. A popular product that does a good job of removing spyware is Lavasoft's Adaware (www.lavasoft.com). Larger organizations can look to companies such as Computer Associates (www.ca.com) for enterprise protection. There are instances when there is simply just too much spyware installed on a machine where these tools cannot help, and you'll be forced to format your hard drive and reinstall your operating system. Hackers: The term hacker has many different meanings to many different people. A dictionary might define the word hacker as follows, "A person who breaks into, or attempts to break into, or use, a computer network or system without authorization, often at random, for personal amusement or gratification, and not necessarily with malicious intent. 2. [An] unauthorized user who attempts to or gains access to an information system 3. A technically sophisticated computer expert who intentionally gains unauthorized access to targeted protected resources, loosely, a computer enthusiast. 4. A person who uses a computer resource in a manner for which it is not intended or which is in conflict with the terms of an acceptable-use policy, but is not necessarily malicious in intent." As you can see, a hacker is someone with a very high aptitude in computing. By studying the inherent design of computer systems, a hacker will then attempt to compromise those systems for a purpose. Typically, they use a collection of tools easily downloadable on the Internet to exploit a flaw in a program or hardware system. Hackers do what they do for various reasons. Some do it for simple prestige amongst their peers, others for financial gain, and others do it to make a political statement. The impact of your network's security being breached can lead to very serious financial losses. Imagine your customer database being sold to a competitor or even what public response would be if you had to tell your customers that their personal information was stolen? Protection from Hackers: I was once told, that no matter how good a safe you buy, there will still always be a locksmith that can un-lock it. The same goes for protection against hackers. However the amount of people with the expertise to bypass most security defenses, available to companies, are few and far in between. To keep your network safe, the following three items are an absolute must. A quality firewall at your network's perimeter to filter what goes in and out of your internet connection, desktop level firewalls to keep internal company computers safe, and the importance of performing updates to your computer's operating system and applications. Firewalls simply stated, filter data passing through them. They are in essence, inspectors that allow and deny data to be passed through them based on certain rules. Most quality firewalls will protect your network by letting the good data through and keeping the bad out. Recommended firewalls for small businesses can be purchased from companies such as Cisco (www.cisco.com), Watchguard (www.watchguard.com) or Sonic Wall (www.sonicwall.com). Firewall vendors typically have many different models available, so consult with your network security professional on what to buy. The important thing is that you have one in place. Desktop level firewalls provide a true multi-layered approach to security. This added level of protection strengthens your computer systems defense, and is especially helpful to companies that have remote workers. Most companies today do have firewalls on their corporate network; however no one ever thinks about the company president's laptop that gets brought home everyday. The president brings his laptop home and sets up his trusty remote connection back into his office over his broadband home Internet connection. The once protected laptop is now completely unprotected and connected directly to the corporate office, which gives a direct avenue for virus and hackers onto your corporate network. The great thing about desktop firewalls is that you can get some great ones for free! If you use the Microsoft Windows XP operating system, simply upgrade to service pack 2 and it includes a free and easy to use desktop level firewall. If you do not have Windows XP or just do not want to use their firewall, Zone Alarm (www.zonealarm.com) offers a great desktop level firewall. The last level of defense is to keep your networked systems up to date with the latest patches and fixes from their respective manufacturers. I will assume that most companies use Microsoft Windows products for most of their computing needs, so to keep your system updated simply go to http://windowsupdate.microsoft.com. You should check for updates twice a month. Even though this article simply brushes the surface of network security, I hope it gives you insight as to some potential dangers out there and real incentive to implement better security for your company. Just as you have an alarm system at your office, please take the necessary steps to protect your company's computer network and data. If not, the costs of recovery I guarantee you will far exceed the costs to implement a secure network. Jarrett M. Pavao studied at the University of Miami, is a Microsoft Certified System Engineer, and Citrix Certified Administrator. Jarrett is the Director of Business Technologies for Docutek, a systems integrator in Boca Raton, FL. Jarrett can be contacted at jpavao@docuteksolutions.com with any network security related questions or concerns. Jarrett M. Pavao studied at the University of Miami, is a Microsoft Certified System Engineer, and Citrix Certified Administrator. Jarrett is the Director of Business Technologies for Docutek, a systems integrator in Boca Raton, FL. Jarrett can be contacted at jpavao@docuteksolutions.com with any network security related questions or concerns.
|
RELATED ARTICLES
Awning Cleaning Business Case Study: Entrepreneurship 101 It is most fascinating to study how entrepreneurs spot opportunity in the market place. "My name is Lance Winslow and I am a serial entrepreneur, I admit I am addicted and need help." ..."Hello Lance." Let me explain how I formed one of my companies which became a franchise system in itself and became a module under the umbrella company I had formed many years the prior. I at first saw it as another business to fit into our growing niche of cleaning businesses. It was to be called the Awning Wash Guys. This is an interesting case study in how businesses form and how companies seek, find and exploit opportunity in the market place. Here is the story: Looking for a Business to Run in the New Revitalized Downtown Area? Looking for a place to add a Quick Lube away from your Super Wal-Mart Competitor? Down Town Revitalization, Why You Should Be Part of Such a Committee. Small Business Mistakes: Are You Making Enough of Them? That's right are you making enough mistakes in your business? Some of you are probably annoyed at my question; others are thinking "Geez, Rose! If I made any more mistakes I'd have to run screaming back to a day job!" Small Business Opportunities And The Tens You may find this Newsletter a little long winded but it's for a good cause: It's all designed for Your Success! Advertising - For Small Businesses (Part 1) Is it right for you? Creating a Power Plan Part of the power plan is making sure you have all the necessary contact information within a company. It is one thing to have the CEO's information, as he is the decision-maker, but it is quite another to have the information on others that you may be working with directly. You will not likely work directly with the CEO on any project or product purchase; you will be referred to the appropriate person. The information you gather on others should be the same as the information you gathered on the CEO. You will need to know the personality type to give you that inside edge, and also how much influence they have on the decision to make a purchase; you may find that these other contacts have an authorized spending limit following a set of guidelines. Multiple Clients Create Your Independent Business Would you rather have one good client paying you fivethousand dollars per month or ten smaller clients payingyou five hundred dollars each per month? Here are two good reasons for choosing multiple clients over just one client. Pressure Washing; How to Bid Concrete Cleaning Jobs Remember the cleaning business is all about time ratio to money. You want to be making at least a $1 a minute when doing concrete work at a minimum and aim for $100 to $200 per hour if you can get it. If you are not achieving this income level then you work too slowly or you did not bid correctly on the accounts you are taking. You need to have a work order form. This form should have an area for time it took to do the job, how many people were on the job, gas to get to the site and mileage to get to the site. If you need a sheet like this the trainers we believe the best program to create this in is the new Microsoft Word, it has some incredible new features which make the formatting so easy you might think of yourself as a graphic designer. Is Brick and Mortar A Passing Fad? Q: Is the online world the best place to sell a product or service these days? My friends seem to think that brick and mortar stores will totally disappear in the future. I debate this all the time with them, but it seems to be heading that way. Your thoughts?- Alex H. How to Give FREE Advice and Make Money When is advice free and when should you charge for it? Consistency Builds Trust You know your prospects need what you sell. You know they want what you sell. Heck, you know that they even sent away for information on your service and requested a quote. Arent Small Businesses Lucky? Why? Because they have access to world class public relations no matter how small they are. How to Wash Mobile Homes as a Business Washing manufactured homes, mobile homes, can be a lucrative and steady business. Generally Mobile Home owners desire to have their mobile homes washed twice per year. There are many mobile home washing companies who make a very good living and have multiple rigs running. If you currently own a pressure washer you may wish to consider a new business washing mobile home and manufactured houses. A Day in the Life of a Self Employed Professional It's Monday morning and Connie the Consultant sits in her executive office chair overseeing her business empire. Her desk is strewn with half finished projects, several weeks worth of to do lists (none of them completed), scribbled post it notes, and a permission slip for her daughter's field trip to the Planetarium that should have been turned in last week. Somewhere, buried deep in the rubble is Connie's business plan. The last time she saw it was during the Clinton Administration. Truck Detailing Shop Business Case Study As an entrepreneur you can learn a lot by following the real life case studies of other entrepreneurs. Often the text books in school leave out the beginning details and the juicy part of how it all comes together and is created out of nothing but a thought. I have an interesting case study for you and it explains how my company got into the truck detailing business. This is a funny story. Book Yourself Solid Key #5: Go Forward With Gusto & Articulate What You Do Want your small business to flip instead of flop?! Statistically half of the entrepreneurs reading this will be out of business in three short years. Establishing a long standing, profitable and successful business absolutely depends on your ability to convey a clear message. A heartfelt message that tells clients exactly what you do, the specific 'invest-able opportunities' you bring to the table and all the ways clients will have a bigger, better, fuller life as a result of working with you. Starting Your Small Business Where do you find more customers? What Is YOUR Value Proposition? Every company has a value proposition. That is a statement of their perceived value to their clients. Often a company will have one perception at the executive level, another at the sales level, and even a third one at the client level. How to Promote Yourself to Small Business Riches You've heard it before; we're living in an information age. The business world is no longer driven by tangible products but on information and ideas. Internet based companies or other companies that use the Internet as an integral marketing tool that don't tap into information-based products or services could soon find themselves without customers or with lackluster sales. Secrets of Cleaning Truck Trailers in Your Fleet from a Veteran Truck Washer Cleaning the trailers towed by big trucks is not easy, those big forty-foot to fifty-three foot boxes are quite intimidating up close when you are holding nothing more than a brush and pressure washer gun, looking at a soap bucket. The hardest thing to do is to clean the back doors of trailers because they get really greasy from all the debris and stuff the truck has driven through. When they run through bad weather areas, they get even dirtier. Pay special attention to rear doors on trailers. Sometimes you'll have to brush them twice. You may even have to do them three times until you get them right. Use a harsh soap or degreaser and watch for left over dirt around the tubular bars that act as the door locks and sealing mechanism. Now on the top of the sides of the trailer you'll have lots of soot if you have a tractor that's been leaking or maybe has a small oil leak or an exhaust problem. This leaves this big exhaust stain down the side of the trailer from the exhaust stack on the tractor. This is a problem because it is hard to clean and you need to clean it. So sometimes you will have to stand on top of the tractor and brush downward. This is done because you cannot get enough leverage from the ground. You may need to pour cleaner directly on your brush or you may need to put cleaner directly on the sides of the trailer. You may need to do both. Make sure the brush is really wet and then set the nozzle on the spray bottle for a steady stream. Spray with the wind and shoot the spray up to the top of the trailer and kind of saturate it a little bit. Then brush it. Now it should be able to come clean. Make sure you rinse really well; otherwise you'll have soap streaks running down the sides. These will be black soap streaks because they will have some of the exhaust mixed in with the soap. |
© Athifea Distribution LLC - 2013 |