Security

Overview

As the world evolves more around technology than ever before, having a solid computer based security infrastructure has become paramount to keeping your data and business safe from external and internal threats.

Whilst the complexities of a solid security plan are beyond the scope of this page, we have listed some important points that you should be following to protect your IT systems.

Acura can assist with creating a more secure network and IT system. Call or email and ask for 'security information'.

  • Don't use simple one word passwords like 'password' or your name. These are simple to guess for a human and even simpler for a computer password cracker program.
  • Do use passwords that contain symbols(!£$%^&*@#), UPPERCASE and lowercase letters, numbers. Make your password a sentence you'll remember like 'I like 2 EGGS in the morning!!'. longer passwords will always take longer to break.

  • Don't write your password down and keep it stuck to the monitor or the wall, or tell it to people. Just because people work in your office, it doesn't mean they cannot be a security risk.
  • Do create memorable passwords and change it regularly and always after someone discovers what it is.

  • Don't leave your device/computer logged when you leave your desk. It's easy for someone to quickly use your computer to access data through your login and you could be liable.
  • Do press CTRL + ALT + DEL on the keyboard and choose 'Lock'. It takes a couple of seconds to do, all your work can stay open and others cannot quickly access data using your security credentials.

  • Don't give your users more access rights than what is required on their computers, and don't allow them to access data beyond what they need for their job.
  • Do use groups on your server/email to allocate people to specific departments and allocate those groups to specific data and software.

  • Don't disable vital security features as a quick fix to enable specific software to work.
  • Do configure firewalls/servers/networks properly to ensure the system is functional and secure.

  • Don't assume your computer system is fully secure because an IT company currently looks after your equipment and system.
  • Do ask your IT provider what firewall is protecting you from the internet, what ports are open and why, what security software you are using.

  • Don't assume that every employee is going to protect your data from theft. It is often a dis-gruntled employee that can cause the most corporate damage.
  • Do consider that every employee could use your data in the future if they move along the career ladder. Ensure their access is limited to what they need now.