Are You Safe? Part TwoLeave a Comment
Did you know that most computer virus infections are self-inflicted? As it turns out, people are curious and unaware. That is a dangerous combination.
Frequently, a virus gets loaded onto a computer; not because it broke through your defenses, but because a user clicked on a link in an email or opened an attachment. This simple action is an invitation for a virus to load, and electronic virus protection is often unaware that this is happening because it is a user initiated action.
How do you stop these attacks? Simply by not allowing them to start. That means telling your employees what can or cannot be clicked, as well as creating policies, procedures and educating your employees.
Many companies are surprisingly lax when it comes to email and internet usage. It is unfortunate how many companies have no electronic security policy. It is frightening how easy it would be to get access to sensitive company information.
While the information is full of malicious software banging away at your firewall, the easiest way for attackers to get in is through an unsolicited email to an unprepared user. However, a well-defined policy and some basic education can provide some much needed protection.
Procedures describing what to do when an email comes with an attachment will stop a host of attacks. Policies about visiting web pages and clicking on links will let employees know what is allowed and what is not. Documenting and distributing this fundamental information will protect company information from those who should not have access.
Policies and procedures combined with solid enforcement are the best protection against harmful attacks to your company.
We work with our clients on creating Policies and Procedures, as well as recovery options should a malicious attack occur. Contact us for more info at: (480) 921-9044 or firstname.lastname@example.org.
Link for Are You Safe? Part 1: http://cciaz.com/safe-part-one/
Next, we’ll look at virus and malware protection beyond the basic anti-virus software.