Posted on: July 31st, 2017 by Wolf TG Admin

Best Practices For Online Security Your company may be serious about data security and technology protection, but did you know that physical security is an important component of IT safety? Is your business up-to-date on best practices for IT physical security?

Take our six-question test and find out:

  1. How do your employees enter and exit the building each day?
    1. Each employee has a key.
    2. Each employee has a key and an access card.
    3. Each employee has a key, an access card, and a PIN code.
    4. We do 3+ we have communicated and enforced our policy against employees sharing keys and passcodes.

Answer: 4; Think of security in layers. Each layer serves as additional protection for your data. A key, access card, PIN code, and policy monitored by a security camera is your most effective security strategy unless you need to invest in biometrics.

  1. Which of the following best matches your company’s Clean Desk Policy?
    1. What’s a Clean Desk Policy?
    2. We require employees to secure all hardcopy and electronic forms of sensitive information at the end of the day.
    3. We do 2 + we require that computer stations be shut down when the desk is open and locked down at day’s end.
    4. Our Clean Desk Policy ensures that critical information about our employees, our intellectual property, our customers and our vendors is out of sight and kept secure in locked areas. Our policy includes guidelines about laptops, mobile devices, PCs, copiers, fax machines, and keys. AND we monitor for compliance.

Answer: 4; An official, complete, and enforced Clean Desk Policy can save time and money, reduce stress, discourage prying eyes, encourage client’s trust, and keep you in compliance with regulatory agencies.

  1. Your employees’ cell phones may be the weakest link in your cybersecurity protection chain. Which of the following are you doing to strengthen that link?
    1. Asking employees to use common sense about what they download from the Internet.
    2. Encrypt corporate data using security software.
    3. Back up information to cloud services.
    4. All the above plus a lot more.

Answer: 4; BYOD (Bring Your Own Device) policies keep workers happy but put can put your business’ data at risk. Whether the device is company property or an employee’s personal tool, it’s an easy entry point for hackers and malware.

  1. Choose the one that best describes your company’s policy for locking down laptops and mobile devices used by traveling employees.
    1. We lock down an employee’s PC whenever he or she is terminated by the company.
    2. We make sure all telecommuters and high-volume travelers use a company laptop with a removable hard drive.
    3. Each employee has a virtual firewall and up-to-date anti-virus software.
    4. All the above

Answer: d; Have the capacity to lock down employee’s PCs, especially those of remote workers or heavy travelers, and keep data safe and separate from the computer in case either device is lost or stolen.

  1. What kind of data loss protection software has your company put in place?
    1. We put a standard antivirus program on all our computers.
    2. We rely on our firewall for data protection.
    3. Our company’s mail flow rule is in place and monitored by software capable of doing deep analysis.
    4. All the above

Answer: d; Data loss protection software should include an antivirus program, a firewall, and a mail flow rule designed to protect or deter sensitive data sent by email.

How did you do? Is your company’s data locked up tightly, safe and secure? If not, where might you need to patch some holes in the cyber security system?

Contact us today at (833) 482-6435 or click the banner below to schedule a security audit by our IT professionals.

}