Every business and non-profit organization should have a WRITTEN security plan in place
before individuals connect to the Internet. Every business and non-profit organization should have
security training and procedures in place BEFORE connecting their private networks
(such as Windows XP, Win2000, NT server, Novel, Apple, Sun, Linux, or Unix server) to the Internet.
Following is basic list of 10 security points that make a good starting point for a written policy.
For more information on businesses that provide Internet and
E-commerce security services, please
click here.
- connecting a private network to the internet is not recommended.
- be prepared to lose and/or have stolen all information that
is on your harddrive. We do recommend a diligent and systematic
back-up plan.
- turn java, java script, active-x, or any other active webpages
off (using your browser's settings.)
- turn off cookies (using your browser's settings.)
- be extremely leery when installing new software
or downloading "plug-in's."
- avoid accepting attachments. Ask people to copy
and paste text to the body of an email. Word, Excel and
other Microsoft attachments are very dangerous. Never
accept an .exe, .vbs or .scr file.
- any incoming attachments that you do accept should be downloaded
to a floppy disk and scanned for viruses.
- your harddrive should be examined for viruses on a regular basis.
- avoid allowing any other's floppy disks into your computer.
- try to use the same caution on the internet as you do in your
daily business transactions... common sense applies to the internet, too!
BONUS RULE #11: Keep memorized, unique passwords for every account.
Our experience has shown that "stand alone" computers can be the least
costly approach to computer security. However, when productivity
becomes an issue, we do offer a wide variety of network security
solutions.