Small businesses need a comprehensive Internet security policy

According to the article by Atchison Frazer, paramount among the internet security threats that concern small businesses, are “content-related and physical-access concerns”.

“Content-related threats generally refer to access of content from the Internet by internal users of the network in violation of company policies. But a new type of content-related threat is an infected file that combines several stand-alone viruses or attack methods in one package. For example, the myDoom virus, using e-mail as its carrier, set up an SMTP e-mail relay engine on each computer it infected to propagate the virus throughout the network. These so-called blended threats are complex and often avoid detection entirely”.

Unauthorized access to corporate network resources includes an external hacker attack as well as purposeful or accidental access to company’s restricted resources by internal users.

“Only a thorough, companywide security policy can protect your network equipment and information”. Here are some of the key elements to consider when developing a security policy:

1. Lock up and monitor physical access to all core network resources.
2. Lock and password-protect all physical and logical ports of your network.
3. Lock network services such as FTP, SMTP, Telnet and Web. Additional network services should be allowed on an as-needed basis.
4. Use firewalls to protect all entry and exit points of the network.

This blog is run by the authors of FindProtected.
FindProtected is a security program that allows you to search for password protected files. With FindProtected, you can effectively identify protected files containing sensitive data on your network.

Leave a Reply