Take these steps to put the right security controls in place for your business. If you use third-party managed IT services, check your contracts and service level agreements and ensure that whoever handles your systems and data has these security controls in place.
Malware protection:
- install anti-virus solutions on all systems
- keep your software and web browsers up to date
- consider restricting access to inappropriate websites to lessen the risk of being exposed to malware
- create a policy governing when and how security updates should be installed
Network security:
- increase protection of your networks, including wireless networks, against external attacks
- use firewalls, proxies, access lists and similar measures
Secure configuration:
- maintain an inventory of all IT equipment and software
- identify a secure standard configuration for all existing and future IT equipment used by your business
- change any default passwords
Managing user privileges:
- restrict staff and third-party access to IT equipment, systems and information to the minimum required
- keep items physically secure to prevent unauthorised access
WFH (working from home):
- ensure that sensitive data is encrypted when stored or transmitted online so that data can only be accessed by authorised users
Removable media:
- restrict the use of removable media such as USB drives, CDs, DVDs and secure digital cards
- protect any data stored on such media to prevent data being lost and malware from being installed
Monitoring:
- monitor the use of all equipment and IT systems
- collect activity logs and ensure that you have the capability to identify any unauthorised or malicious activity
We recommend sourcing a local IT service provider for the best results.
.
.
.
If you plan to buy a product or service for your business in the next 12 months please complete the form below.