Visit www.barracudasecurity.com

Legend

Location Of Theft in AQUA BLUE
URL Of Linked Article In STEEL BLUE or GREEN
Full Content Of Article In BLACK
Theft Description In Body Of Article in RED

Sunday, April 11, 2004

FEDERAL GOVERNMENT BUSINESSES URGED TO SECURE COMPUTERSThe Gleaner: Business from The GleanerApril 11, 2004

Small-business owners have locks on their doors to keep out the bad guys; they need to take similar precautions with their computers, the Council of Better Business Bureaus said.

The BBB, along with the National Cyber Security Alliance and the Federal Trade Commission, is urging small businesses to keep their computer systems secure by evaluating their computer security practices regularly and by performing a substantive security audit at least twice a year -- when they're focused on changing their clocks.

The BBB and the National Cyber Security Alliance have developed a checklist to help businesses guard their computer systems against attacks.

"Computer security is a critically important issue that can impact any size business with a computer and Internet access," said Ken Hunter, president and CEO of the Council of Better Business Bureaus. "Our checklist provides an easy-to-read, easy-to-use tool that will hopefully encourage more business owners and managers to take steps to guard their computer systems against intruders."

"Large and small businesses need to take computer security seriously. This handy checklist should make it easier to do," said Howard Beales, director of the FTC's Bureau of Consumer Protection. "Consumers also can adopt the checklist to protect the information on their home computers."

The checklist recommends:

- Maintain a password-protection program. Use cryptic phrases that combine numbers and both upper- and lower-case letters instead of a "simple" password.

A good way to create a strong password is to think of a memorable phrase and use the first letter of each word as your password, converting some letters into numbers that resemble letters.

For example, "I love Felix; he's a good cat," would become 1lfha6c. Your system should require all users authorized to access your network to create a password when they first log in, change it regularly (at least every 90 days) and lock out prospective users who fail to enter the correct password three times in a row.

- Use virus-protection software. Install virus-protection software on all your computers, and check back routinely with the provider for updates. Most anti-virus software can be set up to update itself weekly. Scan your systems for viruses continually and never disable anti-virus software.

- Install firewalls. Equip your computers with firewalls, which are available wherever software is sold.

Firewalls are gatekeepers; they protect a computer network by shutting out unauthorized users and admitting others only to the areas they are authorized to access.

Install firewalls at every point where your computer system is connected to other networks, including the Internet, a separate local area network at a customer's site or a telephone company switch. Firewalls should be set up to prohibit all activity except what is required to operate your business.

- Use security patches. Most software vendors release updates and patches to their software to correct "bugs" that might allow entry to your computer.

Check your software vendors' Web sites for new security patches; download and install them routinely. Easier still, use the new automated patching features that perform these tasks.

- Back up your data. Set an example for your staff by backing up the data on your computer weekly, at a minimum.

Back up small amounts of data on floppy disks; use CDs to back up more. Keep these disks in a secure place. If you have access to a network, save copies of your data to another computer on the network.

- Routinely check for suspicious activity. Almost all firewalls, encryption programs, and password schemes include an auditing function that records activities on the network. Check data logs and audit trails for unusual or suspicious activity.

- Note the risks of file-sharing. Your computer operating system may allow other computers on a network, including the Internet, to access your computer's hard drive to share files.

File-sharing can lead to viruses, as well as a competitor's ability to read the files on your computer. Unless there's a business reason to share files, consider turning off this function and prohibiting your employees from installing file-sharing programs on their computers.

- Consider buying encryption software. Even if an intruder manages to break through your firewall, the data on your network can be secure if it is encrypted. Stand-alone encryption packages that work with individual applications are in the public domain and available for sale.

- Educate your employees. Develop and enforce a companywide computer and physical security policy that tells employees:

l Not to open e-mail from sources they don't know.

l What to do when they receive suspicious e-mails (when in doubt, delete).

l Disconnect from the Internet when they're not using it.

l The risks of file-sharing.

l How to perform back-up procedures.

l What to do if their computer becomes infected.

Hold routine briefings and updates for employees and managers on these policies, as well as on new security threats, corrective measures and incident reporting procedures.

Copies of the brochure, "Is Your Business Cyber Secure," are available from the FTC's Web site at www.ftc.gov and also from the FTC's Consumer Response Center, Room 130, 600 Pennsylvania Ave., N.W., Washington, D.C. 20580

No comments: