IT technology today is moving faster than we can sometimes keep up with. The way we do things today is far different from how we did it 5 years ago. In 5 years’ time the way we do things may be different once again.
Cloud technology has played a big part in that change. While at first being frowned upon by businesses, nowadays it just makes good business sense.
Recent natural disasters have played a large part in the mind shift. Maintaining the integrity of data is crucial to the ongoing running of any business. Those businesses who already used Cloud technology to backup their data were up and running in no time, when the February 2011 earthquake occurred in Christchurch. Those with data locally found their data was either destroyed or they had to wait weeks or months before they could retrieve their data.
What about staff needing to work on data at home? Staff will often email sensitive files to their personal email address then work on that data on unstable home computers.
How are you managing passwords? Too often, not enough emphasis is put on password compilation and password management. Passwords are there to protect the stuff we value. Therefore using days of the week or months of the year is not acceptable.
How are you storing passwords? Sticking them to your computer with a Post It note? Adding them to a spreadsheet? Such unacceptable practice is not recommended and puts the business and its data at risk.
What about staff churn? How long does it take to shutdown access of departed employees? A disgruntled ex-employee has the potential to do much damage should they still have access to business systems, especially financial data. Large organisations can often link staff access to a central directory. However, this is an area of focus that is found to be weak in many smaller businesses.
Are your USB drives a free-for-all? This is often a source for virus infection.
Do you have clear and concise IT policies that clearly set the boundaries and make staff accountable? An Acceptable Use policy and a Social Media policy play an important part of any business and can go a long way in preventing unwanted behavior.
Does your staff have company devices they take home? Cloud endpoint solutions can now protect those devices OFF the network as well, giving companies the ability to roll out their acceptable use policy regardless of where that device is being used.
We offer an IT Security Audit which sets the baseline then provides clear recommendations once we have gathered data and assessed the current environment. Make sure your environment is operating under best security practices. Its your business that counts.
Posted by Mike Archer. Posted In : IT Security Audit