A recent survey by the software security provider Check Point, found that 93 per cent of the US companies surveyed have mobile devices connecting to their networks and 67 per cent allow personal devices to connect to the network.This explosion in mobile device use has moved the IT security challenge from the controllable arena of closed networks to an interconnected global business network that increasingly includes employees’ personal tablets and phones. Below are 10 IT security best practices to keep your network secure.
1. Implement two-factor authentication code. Yes, while it is annoying having to check your second email for the code. It beats having your constituents sensitive information leaked and having possibly being fired from your organization.
2. Set Your Software to Auto Update. Safeguard against the latest viruses and malware.
3. Secure Your In-House Hardware. Protect your computer hardware from theft.
4. Establish Security Policies. Educate employees on security best practices.
5. Encrypt Your Data. Auto-encryption folders help protect confidential documents, such as those created by Human Resources, from being accessed by unauthorized users.
6. Use Monitoring Software. Equip devices with antivirus monitoring software.
7. Secure External Network Access. Use one-time password tokens for external users.
8. Perform Internal Security Audits. Regularly review security policies to keep up-to-date on the latest technology updates.
9. Establish Strong Security Rules for Admins. Define strong security rules for Administer accounts and make sure login credentials are stored securely.
10. Define Your BYOD Policies. Bring your own devices (BYOD) is a trend of employees using their mobile devices at work. Examine your organizations protocol and use cases when it come to BYOD.
Join Tech Impact and the nonprofit community for a 3-day event (September 17-19, 2017 Nashville, TN) to engage, learn and envision how technology can transform the way we work as nonprofits.
“All About Encryption” Security in a World Without Privacy” Learn about how new tools are designed to provide inherent security from threats like activist hackers and users' reliance on personal devices through end-to-end encryption, data anonymization, and innovative legal techniques.