Protect Your Business From Web-Based Threats: An Introduction To Internet Security
Protect Your Business From Web-Based Threats: An Introduction To Internet Security
Protect Your Business From Web-Based Threats: An Introduction To Internet Security
rit /
un
Issue complexity
Lack of time
Cost constraints
Lack of expertise
Opportunity cost
Many organizations dont have the tools and inhouse expertise to detect these threats, so
attacks and security breaches go unnoticed.
Gartner, Inc., Network Security Monitoring Tools for Lean Forward Security
Programs. February 2011
Safeguards
Tools
Anti-malware software (updated regularly)
Firewalls (firewalls create checkpoints between an internal private
network and the public Internet)
Network encryption: protocols include SSL and TLS for web traffic,
PGP for email, and IPsec for the network layer security
Actions/policies
Don't open any attachments in emails unless you know who sent it
and what it is
Download and install software only from websites you know and
trust.
Make sure your browser security setting is high enough to detect
unauthorized downloads
Use a pop-up blocker and don't click on any links within pop-ups
Wi-Fi security: Change the name and password of your router from
the default settings
Use WPA2 encryption whenever possible
Worth the trouble?
Yes! Improving your security posture will help your business:
Create a safe working environment for your team
Prevent pornographic, offensive, hostile materials from being
inadvertently distributed through your network
Reduce risk of costly network infrastructure damage
Promote workplace productivity (ensure your network is used for
business productivity, not as a recreational diversion)
Reduce liability (prevent employees from using your network to
conduct illegal activity)
Protect employee and business privacy