Computer threats are real and getting worse
As if there isn't enough to worry about in today's business environment with pressures on the business to make sales/profits, remain competitive, be innovative, etc., you now need to add to the ever increasing threat of computer and network attacks to the mix. They are coming from all ends both internal and external and can result in a loss of data/information, time, resources and productivity. These threats affect everyone and we all need to do our part to alleviate this risk.
So lets start by identifying some of the examples of these threats:
- Viruses/Worms - Sasser, Zotob, Nimda, Welchia, Melissa, I Love You, Blaster
- Hackers
- Crackers
- Malicious code - Spyware, Malware, Adware, Keyloggers, RATs, Trojans
- Botnets - zombie PCs
- Phishing
- Social engineering
- Drive by downloads
- Installing malicious codes on your systems at home and work
- Through email and attachments - pictures applications web pictures, applications, links, wallpaper
- System drivers, printer drivers, wireless drivers
- Media players -iPods
- Media files - as in the case of movies (AVI's, MPG's, etc.)
- Free software distribution - freebies online purporting to get rid of threats but brings in even bigger threats with more serious intent.
- Your data...
- Confidential information
- Personal records
- Financial records
- Anything that can be used for financial gains and espionage.
- List the number employees in your business
- Calculate an average hourly compensation per employee
- Think about what files and work might need to be recreated after a loss: customer database, client reports, project files, and schedules, contracts, etc.
- Estimate the amount of time required to re-create lost databases, financial files, and other work per employee
- Multiply the time required by the number of employees affected by the average hourly compensation
So how do you protect against them?
- People - awareness, communications, company policies, IT taking the lead in disseminating information on a regular basis
- Processes
- User Awareness sessions policy
- Incident response Policy * I highlight this because it explains what and how you will react to a compromise, including what do you tell clients/customers/vendors
- Approved Applications Policy
- Approved Devices
- VPN Access Policy
- Patch Management Policy
- Network Management and use Policy
- Email / IM Messaging Policy
- User Access Control Policy
- Technology
- The "Break fix" approach to IT may not cut it anymore. Partner with a company that provides a "Managed Care" service that can help with managing the risk, and can also provide constant awareness, mitigation and remediation.
- Appoint someone who will be responsible for IT Security Infrastructure responsibilities - a consulting company or internal employee. That way if and when anything happens you know who to go to and how to get the answers you need.
- Conduct regular IT security workshops, programs and things that will help user to be more aware of the risks at hand and the roles they play in mitigating them
- Other prevention methods include...
- Install antivirus on all desktops, laptops, and servers
- Check for virus definitions daily or set for automatic updates
- Stop intruders with a firewall
- Use a firewall on all desktops, laptops, and servers
- Stay on top of security updates
- Deploy security patches and fixes as soon as they are available
- Use the latest operating system versions
- Create strong passwords and change them frequently
- Don't allow Web browsers to remember passwords/private data
- Open email responsibly
- Scrutinize attachments before opening them; avoid ones with unusual extensions
- Don't open or reply to unsolicited mail
- Install antivirus on all desktops, laptops, and servers
Thanks to Brett A. Scudder from The Technology Suite for contributing to this article. :)