Feb 24, 2011

Data theft: How to protect your company's valuable data

Occasionally, a company may find that one or more of it's employees have stolen valuable data of some kind.  Internal security threats are much bigger than external threats because an employee has greater access and knowledge of the work environment and the company network.  Through regular use of the company's operating system and email client or accessing the network with their user ID and password, an employee may become familiar with the steps necessary to compromise the security of their company's network, particularly if that network is not secure or set up improperly.

Employees can steal data via personal flash drives and email.  If an employee needs to work from home or take documents home from the office always have them check with your IT department and their supervisor to ensure they are following corporate policy.  As an added measure of safety, have your IT department supply password protected flash drives to that employee after obtaining consent from their supervisor for the employee to use the flash drive.  This is a simple system of checks and balances designed to serve as a deterrent.  
 
How can your IT manager protect your company from internal data security threats?
  • Establish clear policies for employees regarding accessing and saving documents and other files on shared network drives or flash drives and most important, internet and email usage.  
  • Hold regular meetings and trainings for executives and other managers to (re)educate them on your company's network usage policies.
  • For PC based networks, setup restrictions and policy setting on servers using Active Directory (http://www.microsoft.com/windowsserver2008/en/us/ad-main.aspx) which will be applied on all desktops to restrict users' access to the network and what they are allowed to do on their computers. 
  • Install a secure anti-virus software on each server and desktop that has virus, spam and spyware protection to block all traces of viruses, spam and spyware on the systems but most important, your network. 
  • Configure router and switches to block certain access to unnecessary open ports on the network. 
  • Setup email monitoring tools and software on your email server to monitor each employee’s use of incoming and outgoing emails and establish a limit and restrict to whom they are may to send external emails.
  • Set-up web filtering software like Websense (http://www.websense.com/content/Products.aspx) or install a device like Cymphonix (http://www.cymphonix.com/), a web gateway, to filter each user’s internet and application use on the network and generate a monthly report on each user’s activity on network, application and internet usage. 
  • Create a shared network drive and grant email access for a backup user for an employee in case of termination where that backup user will have access to that employees files and emails.   
  • Create a termination policy for 30 days when an employee is terminated to delete their account from the network so they cannot use their user ID to sign into the network or access email.  

Feb 15, 2011

This week's technology tips, tricks and news

Today NMC celebrates 7 years of helping customers meet their technology needs!


New Millennium Computers NY, LLC was founded in February of 2004 by Michael (Mike) Wilkins and Momodou Sawaneh, longtime college friends who had a passion for technology, a desire to help others and the vision to start their own company.  As experts in computer and web technology, NMC offers a wide range of services and products for clients in the New York City metropolitan area and beyond at competitive prices.  We offer our clients customized packages of products and services to meet their individual needs, both in their homes and at their offices.  We aim to stand out from our competition by placing a priority on excellent customer service, staying on top of new developments in technology and offering unique technology solutions that meet or exceed our client’s needs.
Mike and Momodou are grateful for the many clients who have and continue to work with them and thank them for making NMC a success.  To learn more about NMC, call us at (212) 851-8426.

Feb 12, 2011

Electronics gifts for your Valentine

If your Valentine would prefer an e-reader or a shiny, new, red digital camera to roses or a fancy dinner on V-Day, check out Sears' Valentine's Day Electronics Gift Guide for some cool gift ideas!

Feb 8, 2011

How to Secure a Wireless Network from Hackers?

Having a wireless network can be a good way for computers and laptops to connect to the internet but it is always key to make sure that the proper security is setup on a wireless network to prevent hackers or people from abusing a wireless network for the wrong purposes.

The reason a wireless network should be secured is to stop people from using the services of a network that don’t have the permission to utilize them. Although it is harder to secure a wireless network from hackers compared to a wired network is due to the fact that a wireless network can be accessed from anywhere inside the range of its antenna.

The following steps below will help you secure a wireless network from hackers

  1. Position the access point’s antenna in a place that restricts the range of its signal beyond the required area do not put the antenna close to a window because glass can’t obstruct it. Place it in a central location in the building.
  2. Use WEP, WPA, or WPA2 which stands for Wireless Encryption Protocol, Wi-Fi Protected Access, and Wi-Fi Protected Access 2. All three of these protocols will protect and secure your wireless network.
  3. Change the SSID; disable the broadcast of SSID which stands for service set identifier. SSID utilizes wireless access points which allow users to start wireless connections. Always select a unique SSID and if it is attainable hold back the broadcast of the SSID over the wireless antenna so that it won’t appear in the listing of networks.
  4. Disable DHCP doing this will prevent hackers from decoding TCP/IP parameters, subnet masks, and the IP address in order to hack a wireless network.
  5. Disable or modify SNMP settings: Change the private as well as public community settings of SNMP. You can also just disable it. Otherwise the hackers will be able to utilize SNMP to get significant info regarding your wireless network.
  6. Utilize Access Lists: For additional security of your wireless network, and if your access point support this feature, employ an access list. An access list lets us determine precisely which machinery is permitted to attach to an access point. The access points which include the access list can employ trivial file transfer protocol (TFTP) now and then in order to download modernized lists to steer clear of hackers.

These are the key six steps to protect your wireless network from intruduers invading and abusing the uses of a wireless network..

For more computer tips and tricks from New Millennium Computers please follow our weekly blog posts at http://newmillenniumpcs.blogspot.com

 

Related Posts Plugin for WordPress, Blogger...