Importance of Corporate Network Security

As I am sure you have read lately, hacking and corporate network intrusion are at an all-time high. Many examples of these hacks happen due to innocent actions of a company\’s employees. A recent example is the latest Cisco Hack:

“During the investigation, it was determined that a Cisco employee’s credentials were compromised after an attacker gained control of a personal Google account where credentials saved in the victim’s browser were being synchronized,” wrote Cisco Talos in a lengthy breakdown of the attack.

The above is a great example of one safe measure we recommend to our corporate customers and that is to make sure that your employees do not access your corporate network with their personal devices. Even an employee\’s personal iPhone, iPad, Android phone, or tablet when connected to a corporate network can cause irreparable damage. The main reason for this is there is no central security policy in place on the personal device of an employee.

Another example of a corporate network security no-no would be utilizing PW storage services on web browsers. Here is an excellent article from TechRepublic that addresses this.

August eTech can assist your businesses in creating policies and procedures for how employees handle passwords, can create domain rules to block web browser password retention, and help businesses set up their own secure password storage.

Here are some other items recommended to all businesses that August E Tech can assist you with:

  •  Install anti-malware/anti-virus security software on all devices (laptops, desktops, routers, tablets, and phones) and keep the software set to automatically update.
  •  Use strong passwords of eight or more characters, use different passwords for each account, use special and alphanumeric characters, use phrases, password protect wireless devices and use a secure password manager program.
  • Encrypt all sensitive files/emails, especially those with the taxpayer’s personally identifiable information, and use strong password protections.
  • Back up sensitive data to a safe and secure external source not connected full-time to a network.
  • Wipe clean or destroy old computer hard drives and printers that contain sensitive data.

Reach out to us today to learn more about our comprehensive yet affordable IT Security services.

Leave a Reply

Your email address will not be published. Required fields are marked *

Facebook Twitter Instagram Linkedin Youtube