-* 10 Ways to Keep IT Systems Secure*- - MeraForum Community.No 1 Pakistani Forum Community

MeraForum Community.No 1 Pakistani Forum Community

link| link| link
MeraForum Community.No 1 Pakistani Forum Community » The World of Information » Discuss Your Pc Problems » -* 10 Ways to Keep IT Systems Secure*-
Discuss Your Pc Problems !! Share your PC problem/ Virus Problems and Get Solution From Here !!

Advertisement
 
Post New Thread  Reply
 
Thread Tools Display Modes
(#1)
Old
~ Sanam Khan ~ ~ Sanam Khan ~ is offline
 


Posts: 13,973
My Photos: ()
Country:
Star Sign:
Join Date: Mar 2010
Location: *Ɯσи∂ɛяℓαи∂*
Gender: Female
star -* 10 Ways to Keep IT Systems Secure*- - >>   Show Printable Version  Show Printable Version   Email this Page  Email this Page   08-03-2011, 05:09 PM

10 Ways to Keep IT Systems Secure

Technology continues to be a boon for entrepreneurs, offering increased mobility, productivity and ROI at shrinking expense. But as useful as modern innovations such as smartphones, tablet PCs and cloud computing are to small businesses, they also present growing security concerns. Following are 10 safety tips to help you guard against high-tech failure:

1. Protect with passwords.

This may seem like a no-brainer, but many cyber attacks succeed precisely because of weak password protocols. Access to all equipment, wireless networks and sensitive data should be guarded with unique user names and passwords keyed to specific individuals. The strongest passwords contain numbers, letters and symbols, and aren’t based on commonplace words, standard dictionary terms or easy-to-guess dates such as birthdays. Each user should further have a unique password wherever it appears on a device or network. If you create a master document containing all user passcodes, be sure to encrypt it with its own passcode and store it in a secure place.

2. Design safe systems.

Reduce exposure to hackers and thieves by limiting access to your technology infrastructure. Minimize points of failure by eliminating unnecessary access to hardware and software, and restricting individual users’ and systems’ privileges only to needed equipment and programs. Whenever possible, minimize the scope of potential damage to your networks by using a unique set of email addresses, logins, servers and domain names for each user, work group or department as well.

3. Conduct screening and background checks.

While rogue hackers get most of the press, the majority of unauthorized intrusions occur from inside network firewalls. Screen all prospective employees from the mailroom to the executive suite. Beyond simply calling references, be certain to research their credibility as well. An initial trial period, during which access to sensitive data is either prohibited or limited, is also recommended. And it wouldn’t hurt to monitor new employees for suspicious network activity.

4. Provide basic training.

Countless security breaches occur as a result of human error or carelessness. You can help build a corporate culture that emphasizes computer security through training programs that warn of the risks of sloppy password practices and the careless use of networks, programs and devices. All security measures, from basic document-disposal procedures to protocols for handling lost passwords, should be second-nature to members of your organization.

5. Avoid unknown email attachments.

Never, ever click on unsolicited email attachments, which can contain viruses, Trojan programs or computer worms. Before opening them, always contact the sender to confirm message contents. If you’re unfamiliar with the source, it’s always best to err on the side of caution by deleting the message, then potentially blocking the sender’s account and warning others to do the same.

6. Hang up and call back.

So-called "social engineers," or cons with a gift for gab, often prey on unsuspecting victims by pretending to be someone they’re not. If a purported representative from the bank or strategic partner seeking sensitive data calls, always end the call and hang up. Then dial your direct contact at that organization, or one of its public numbers to confirm the call was legitimate. Never try to verify suspicious calls with a number provided by the caller.

7. Think before clicking.

Phishing scams operate by sending innocent-looking emails from apparently trusted sources asking for usernames, passwords or personal information. Some scam artists even create fake Web sites that encourage potential victims from inputting the data themselves. Always go directly to a company’s known Internet address or pick up the phone before providing such info or clicking on suspicious links.

8. Use a virus scanner, and keep all software up-to-date.

Whether working at home or on an office network, it pays to install basic virus scanning capability on your PC. Many network providers now offer such applications for free. Keeping software of all types up to date is also imperative, including scheduling regular downloads of security updates, which help guard against new viruses and variations of old threats.

9. Keep sensitive data out of the cloud.

Cloud computing offers businesses many benefits and cost savings. But such services also could pose additional threats as data are housed on remote servers operated by third parties who may have their own security issues. With many cloud-based services still in their infancy, it’s prudent to keep your most confidential data on your own networks.

10. Stay paranoid.

Shred everything, including documents with corporate names, addresses and other information, including the logos of vendors and banks you deal with. Never leave sensitive reports out on your desk or otherwise accessible for any sustained period of time, let alone overnight. Change passwords regularly and often, especially if you’ve shared them with an associate. It may seem obsessive, but a healthy dose of paranoia could prevent a major data breach.


NEVER ACCEPT ANY ONLINE FILES FROM ANY ONE

 


Last edited by ~ Sanam Khan ~; 08-03-2011 at 11:46 PM..
Reply With Quote Share on facebook
Sponsored Links
(#2)
Old
CaReLeSs CaReLeSs is offline
 


Posts: 16,486
My Photos: ()
Country:
Join Date: Aug 2010
Gender: Male
Default Re: -* 10 Ways to Keep IT Systems Secure*- - >>   Show Printable Version  Show Printable Version   Email this Page  Email this Page   08-03-2011, 05:42 PM

THanks FOr Sharing....

 



I'M Not Really A BaD InfLuence
But IN YouR CasE
I'LL MaKe n EXCETION


(#3)
Old
AYAZ's Avatar
AYAZ AYAZ is offline
 


Posts: 12,370
My Photos: ()
Country:
Star Sign:
Join Date: Aug 2008
Location: Karachi
Gender: Male
Default Re: -* 10 Ways to Keep IT Systems Secure*- - >>   Show Printable Version  Show Printable Version   Email this Page  Email this Page   08-03-2011, 06:12 PM

very informative sharing . This one too should be added .

NEVER ACCEPT ANY ONLINE FILES FROM ANY ONE .

 







ALLAH FARMATA HAI :
AEY BANDEY JO HUA
WO ACHA HUA .
JO HORAHA HAI ACHA HO RAHA HAI.
JO HOGA WO BHI ACHA HOGA.
TERA KIYA GAIYA JO TU ROTA HAI
TU KIA LAYA JO TU NE KHO DIYA.
JO LIYA YAHIN (DUNYA) SEI LIYA
JO DIYA YAHIN (DUNYA) PE DIYA
JO AAJ TERA HAI PEHLAY KISI AUR KA THA
AUR KAL KISI AUR KA HOGA.
TABDEELI KAINAAT KA MAMOOL HAI
BAS TU WO JAMA KAR JO TU SATH LEI KAR JANEY WALA HAI
YANI NAIK AMAAL.


(#4)
Old
Morash's Avatar
Morash Morash is offline
 


Posts: 17,781
My Photos: ()
Country:
Star Sign:
Join Date: Jul 2010
Location: ▌║█║▌│█│║▌║
Gender: Male
Default Re: -* 10 Ways to Keep IT Systems Secure*- - >>   Show Printable Version  Show Printable Version   Email this Page  Email this Page   08-03-2011, 06:16 PM

Very Helpful Thread!!

Thanks Fa sharing Sanam!!

 





bE driveN wiTh puRpOse, Be r313n71355 in your alιgnмenт;
with excellence.
pAy n0 mInd to the ∂ιsιмραssισηε∂ เ๓ק๏tєภt ђคtєгร

.. нoolιgan
(#5)
Old
~ Sanam Khan ~ ~ Sanam Khan ~ is offline
 


Posts: 13,973
My Photos: ()
Country:
Star Sign:
Join Date: Mar 2010
Location: *Ɯσи∂ɛяℓαи∂*
Gender: Female
Default Re: -* 10 Ways to Keep IT Systems Secure*- - >>   Show Printable Version  Show Printable Version   Email this Page  Email this Page   08-03-2011, 11:46 PM

Fankx All ..
@ .. Ayaz I've Edited .. Thx

 

(#6)
Old
ღƬαsнι☣Rασ™ ღƬαsнι☣Rασ™ is offline
 


Posts: 29,879
My Photos: ()
Country:
Star Sign:
Join Date: Sep 2010
Gender: Male
Default Re: -* 10 Ways to Keep IT Systems Secure*- - >>   Show Printable Version  Show Printable Version   Email this Page  Email this Page   08-17-2011, 11:40 PM



-‘๑’- шОщ -‘๑’-
..:: GоОd pО$т ::..
THAЙК$ FОЯ $HAЯЇИG

 



●❤ღ Dяєaм Lоvєґ ღ❤●






(#7)
Old
~ Sanam Khan ~ ~ Sanam Khan ~ is offline
 


Posts: 13,973
My Photos: ()
Country:
Star Sign:
Join Date: Mar 2010
Location: *Ɯσи∂ɛяℓαи∂*
Gender: Female
Default Re: -* 10 Ways to Keep IT Systems Secure*- - >>   Show Printable Version  Show Printable Version   Email this Page  Email this Page   04-01-2012, 12:55 AM

Thx Tashi

 

(#8)
Old
(‘“*JiĢäR*”’) (‘“*JiĢäR*”’) is offline
 


Posts: 43,615
My Photos: ()
Country:
Star Sign:
Join Date: Jul 2010
Location: © ℓ ợ Ş ệ → тớ → µг ↔ ♥
Gender: Male
Default Re: -* 10 Ways to Keep IT Systems Secure*- - >>   Show Printable Version  Show Printable Version   Email this Page  Email this Page   05-08-2012, 11:54 AM

Good Sharing

 



დ∫დ→◄●♥●►↔ǺήĐằŽ~◊Ệ◊~ßάΫǻЙ↔◄●♥●►←დ∫დ




Post New Thread  Reply

Bookmarks

Tags
secure, systems, ways

« Previous Thread | Next Thread »
Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Similar Threads
Thread Thread Starter Forum Replies Last Post
How 2 Create A Safe n Secure Password Aslam Computer and Information Technology 4 07-02-2011 03:02 AM
Tip: Secure that USB Drive (¯*♥¤»ƙɧՄՏɧՅԾԾ«¤♥*¯) Computer and Information Technology 12 01-28-2011 04:04 PM


All times are GMT +5. The time now is 04:24 PM.
Powered by vBulletin®
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.

All the logos and copyrights are the property of their respective owners. All stuff found on this site is posted by members / users and displayed here as they are believed to be in the "public domain". If you are the rightful owner of any content posted here, and object to them being displayed, please contact us and it will be removed promptly.

Nav Item BG