By Michelle Swafford, The Tribune, Mesa, Ariz. Knight Ridder/Tribune Business News
Sep. 25--It doesn't matter if you're a small business owner, work for a large corporation or use a home computer, you're probably at risk of losing vital information or being impersonated if you don't take proper security measures.
This was the message given to small and medium-size business owners Tuesday morning at a seminar held at Chaparral Suites in Scottsdale. Christy Strauch, chief executive officer for Rimmer Computer in Scottsdale shared tips on protecting information from competitors, hackers and even other employees.
Her company offers services that can monitor employees' Internet habits, back up files, detect weak passwords, test the strength of firewalls and a variety of other services. Services range from $199 to $599.
"It's impossible to make something 100 percent secure because there's always a human factor," Strauch said. "That doesn't mean you shouldn't try."
Any computer can have files stored without the owner knowing it, have files taken from the computer without the owner's knowledge and viruses and junk e-mail can be generated from a computer by an outside user without security software and cautious habits, Strauch said.
Common problems business owners face with employees include unknowledgeable employees who release passwords, share confidential information in e-mails and surf the Internet using company resources.
Without a firewall, good passwords, spelled-out employee policies, virus software and adequate back-ups of files, everyone could be in danger, she said.
"There are inexpensive steps you can take now," she said. "A home computer is in as much danger as a network."
The first thing all employers should do is write out a clear policy on what is and isn't allowed on company computers including the use of the Internet for surfing, private e-mail, downloading music and videos and having personal pictures and screensavers saved, Strauch said.
Employers should also evaluate who has access to what files and information and who can add and delete items, especially once an employee leaves.
It's critical that the person's username and passwords are removed from the system, Strauch said.
According to an article at ZDNet News, nearly 40 percent of computer users still use the word "password" as their password. Strauch offered the following password tips to minimize people gaining access to them:
-- Mix upper and lower case letters and combine them with punctuation marks and numbers -- make it at least eight characters long.
-- Avoid passwords based on personal information and family names.
-- Avoid words that are found in dictionaries of any language because software can crack these.
Virus software and firewalls also can protect users from malicious intent. Virus software is only useful if it stays updated, Strauch said. Other tips to avoid viruses include:
-- Avoid trial versions of virus software because they're condensed versions.
-- Uncheck file and printer sharing in Windows under the Network menu in the Control Panel folder.
-- Keep up with software patches and updates, which fix software flaws.
A firewall is an impermeable fence around a network to protect it from hackers. They can range from no cost to more $1 million. "You need to have one for home and work," Strauch said. "If your home computer is your business you need to spend more than $0 on a firewall."
Without a firewall, hackers can place bits of information on computers around the world called zombies. Hackers can launch these zombies at any time and they inundate Web sites with traffic until they crash.
Hackers can also store files on other people's computers without their knowledge if they don't have a firewall, Strauch said.
Once users secure their information, they need to regularly back it up in case the computer crashes or a natural disaster destroys the computer. Strauch offered the following tips regarding file back-ups:
-- Don't store critical information on local drives because they aren't backed up.
-- Open files can't be backed up; employees should close files and log off the network when they leave.
-- Keep more than a two-week back-up.
-- Conduct a full back-up every 30 days and store all back-ups in a safety deposit box or in a safe place away from the computer. Fire files will melt back-up tapes and are a bad idea.
-- Restore tapes and disks periodically to make sure the back up version works.
Some online computer security resources are:
www.CERT.org www.rimmercomputer.com www.zonelabs.com www.securecomputing.com www.slac.stanford.edu/comp/security/password.html www.mcafee.com www.symantec.com www.norton.com www.pgpi.com
To see more of The Tribune, or to subscribe to the newspaper, go to http://www.eastvalleytribune.com.
(c) 2002, The Tribune, Mesa, Ariz. Distributed by Knight Ridder/Tribune Business News.
ZDZ,

Комментариев нет:
Отправить комментарий