Is Your Network Secure?

From sending email to opening a file, connecting to Wi-Fi to browsing the web, critical business data on your network must be protected. There are dozens of opportunities to protect your network from unwanted access, but here we’d like to share some of the simplest and most effective network security strategies. Is your network secure?

● Are passwords robust? Make sure passwords are eight characters in length or more, and include at least one upper- and one lower-case letter, a number, and a special character. Avoid actual words and letter substitutes—hacking software is sophisticated enough to recognize when you use “$” instead of “S”.

● Are passwords changed regularly? The longer a password exists, the more vulnerable it is. Tired of managing dozens of passwords that change all the time? Consider an enterprise password management service application, so you’ll only need to remember one.

● Are all inactive accounts disabled? Every account is a door that can be breached, so don’t delay—each individual account should be disabled as soon as an employee leaves.

● Is your data regularly backed up offsite? Whether in another office or with a cloud-based server, make sure your data is recoverable even if your office is lost to a fire or disaster.

● Does every computer and mobile device have antivirus software installed? Don’t be a sitting duck for spyware, ransomware, viruses, and other malware. Ensure every piece of hardware in your network has active, up-to-date antivirus software installed. Also, don’t wait to update! It is crucial that all of your devices are running the latest version of antivirus software available to ensure the security of your data.

● Do you use WPA2 encryption? Short for “Wi-Fi Protected Access 2,” WPA2 encryption ensures that your Wi-Fi connection is secure. So, don’t leave your virtual front door open. WPA2 authentication is easy to set up and simple to comply with.

● Is your equipment physically secured? Don’t leave your physical doors open, either. Store critical hardware in a locked room with limited accessibility. A data thief doesn’t need to worry about hacking the network if they can walk in and physically remove the device they want to access.

If you answered “No” to any of these questions, you have work to do. Take these few simple steps and get your network secure and your data protected.