Key loggers, spybots, viruses, worms, zombie PCs — if you know anything about computer and network security, these words can send a chill through you, and they can have devastating effects on your business. Network security solutions involve hardware and software, but they also include monitoring and vigilance, on your part or that of your managed services partner. Here’s a quick checklist to help keep your IT infrastructure secure and running smoothly.
1. Inventory your existing computer security assets. Is antivirus software installed on all of your computers? Are all desktop PCs, laptops, smart phones, and tablet computers defended by firewalls, virtual private networks, and intrusion prevention solutions? Can your security tools communicate and work together?
2. List how all your information assets are accessed. This can help decide how many layers of protection your network security system requires. What is the most business-critical data you have? What is that data worth? That is, what would it cost to replace that data? Where is that data kept, how is it accessed, and by whom?
3. Look at potential risks. What effect or effects would a computer and network security breach have on your business? How much downtime due to security issues can your business absorb? What about noncompliance with government regulations?
4. Factor growth into your security solutions. Your computer and network security solution should be able to handle additional network traffic or advanced applications without disrupting business operations. How adaptable and flexible is your security system?
In short, it won’t take much time to ensure that your business network is secure. Follow these simple steps, and the only zombies you’ll encounter will be the ones you see in the movies or on TV.