Making IT Your Business
        Company security is everyone's responsibility
        
        
			- By Monte Robertson
 - Feb 14, 2008
 
		
        
		Sometimes it seems as if everything
  is about security these
  days. Homeland security, physical
  security, digital security—
  there’s constantly a new security issue
  that needs attention.
The common thread, and threat, in all
  these areas is people. You can’t lock up
  your staff or seal their mouths, so you need
  a process to keep your most valuable assets
  from turning into your worst nightmare.
  There was a lot of truth behind the old
  wartime saying “loose lips sink ships.”
  Businesses have many areas of risk that are
  as vulnerable to careless behaviors and
  communication as the Atlantic convoys
  were during World War II.
Homeland security affects travelers and
  anyone near a critical area. Physical security
  affects people who use keys to enter a facility
  or who must remember to shred a sensitive
  document. Digital security affects people
  every time they turn on computers and
  includes passwords, anti-virus software to
  protect systems online and backup systems to
  get users back on track if something happens.
While most people don’t have a lot of
  individual control over homeland security
  issues, employees are able to control many
  aspects, both physical and digital, of their
  business security by creating and implementing
  a security policy—the glue that
  holds it all together and gives businesses a
  fighting chance at survival. The layered
  security model shows how important such
  policy is in securing a business.
Beyond Common Sense   
  Most actions taken are common sense, but
  it can be surprising how many small businesses
  skip one or more of the essentials.
  Whatever else you economize on, smoke
  detectors, an alarm system and a fireproof
  safe should not be among them. But what
  about the paper shredder? And do you keep
  a record of the number and distribution of
  master keys? Yes. If you don’t know who
  has keys and where those keys are at all
  times, the door might as well be wide open.
Physical security starts with good insurance.
  It’s important that the insurance policies
  you choose to protect your business are
  the right ones. Help your insurance agent
  understand your business and what is most
  valuable to you. Most insurance policies
  offer discounts on a sliding scale, depending
  on what you do to protect the business.
Physical security also is essential for
  critical servers and other computers. A
  motivated person with physical access can
  get into any Windows®-based device without
  knowing the user name or password—
  something you need to remember when
  putting a basic security policy together.
New Challenges 
  Passwords need to be hard to guess and
  changed frequently, which all too often
  means that people write their passwords
  down. For every manager who keeps his or
  her passwords in a “little black book” that’s
  stored in the fireproof safe, there are 10
  employees whose desks are littered with
  password-inscribed Post-it® notes.
Passwords go some way toward protecting
  laptops left in taxicabs, for example,
  but a better way to go is to make it policy
  to encrypt laptop hard drives. Encryption
  software is easy to use, widely available
  and inexpensive. It will nearly guarantee
  that a thief can’t access the data stored on
  the machine. It’s also about the easiest way
  there is to ensure that your business is in
  compliance with government regulations
  regarding data protection and privacy.
You’ve probably figured out how to
  manage virus, spyware and spam problems.
  But what’s going on now on the Web
  is entirely different. The game has changed
  dramatically—and so have the risks.
Organized crime has taken to the Web in
  a big way. The criminals—and their digital
  weapons—can be completely invisible. One
  pixel on the screen can hold a poison dart
  that can exploit a common software application
  like Internet Explorer and steal information
  without anyone noticing. Microsoft’s
  much-vaunted “Patch Tuesday,” when security
  fixes are released, is now routinely followed
  by “Exploit Wednesday.”
Your employees also are busy adding
  new programs to their systems that make
  them even more susceptible to security
  breaches. Social networks like Facebook and
  IM and VoIP applications like Skype are tunneling
  into and out of your business. If you
  thought keeping control of spam and stopping
  users from opening e-mail attachments
  was tough, welcome to the brave new world
of Web 2.0.
Web 2.0 is all about two-way, synchronous
  communication. All of the abovementioned
  activities might be convenient
  for getting business done, and can save a
  considerable amount of money, but they
come at a cost.
  
    Business Security Resources 
        General business security information: 
          Small Business Administration: www.sba.gov 
      Allbusiness.com, a portal for everything related to managing a business effectively: www.allbusiness.com 
      Local chamber of commerce—often a great resource. If there’s a local technology group, as well, join it. 
      Training and security information:  
        Tips for businesses to protect personal information: www.ftc.gov 
      NCSA resource—Stay Safe Online: www.staysafeonline.info 
      Security awareness training course: irtsectraining.nih.gov 
      Home network security: www.cert.org 
      Identity theft resources: www.ftc.gov 
      Policies, standards and guidelines: 
        SANS security policy resource page—probably the best place on the Web to start when
        creating a security policy. There are free examples here, but make sure you consider all
        aspects of securing your business. www2.sans.org  | 
  
Saving money means a trade-off elsewhere.
  And in the case of these real-time
  activities, the big downside is lack of security.
  Sharing data and keeping that data
  secure is like mixing oil and water. You can
  either share data or secure data, but not
  both. And while it would be nice to simply
  lock everything down and block consumerdriven
  applications, it’s simply not realistic
  to expect users to live with that level of
  inflexibility—or they’ll be spending half
their time trying to get around it.
Computer security is an ever-changing
  landscape. At a minimum, users need antivirus,
  anti-spyware, anti-exploit, antispam,
  firewall, encryption and backup—
  and everything needs to be kept up to date
  at all times. Plus, security measures need to
  be as transparent to your users as possible.
  If security gets in the way of working,
users will work around it.
If you’re like most small businesses,
  you simply don’t have the bandwidth, the
  manpower or the expertise to deal with all
  of this. So you need a reseller or consultancy
with security expertise to help guide you through this security maze.
The Human Factor 
  People security starts with the hiring
  process. It’s so easy these days to check a
  person’s history online that there’s no reason
  not to do it, and there are plenty of reasons
  why you should. There are firms that will do
  this for you, as well, but be sure that when
  you search under the term “background
  checks” the site you click on is not dishing
out malicious code.
Make security part of the new-hire orientation
  process. If you can educate your people
  to understand the risks they are exposing
  the business to with some of their behaviors,
  there is a good chance you can start to tilt the
  balance in your favor. It only takes one weak
  link to break the security chain and potentially
expose everyone to the risk.
The big roadblock for businesses implementing
  training and awareness programs
  is time. Security training is crucial to business.
  Since time also is crucial, find a way
  to make ongoing security training relevant
  and fun. Make it worth the employees’ time
  to understand why security is so important
to the business.
Tying it All Together 
  Security awareness really needs to be
  embedded in the fabric of your business,
  which means policies must be in place for
  all aspects of security. Make security part of
  everyone’s routine by establishing security
  policies in writing and making sure they’re
  implemented correctly. Repetition, consequences
and follow-through will pay off.
The section of the policy on physical
  security needs to cover, at a minimum,
  essentials like who has keys to what, the
  process for issuing new or replacement
  keys, changing smoke alarm batteries,
  alarm-setting and maintenance responsibilities,
  and the factors that determine which
documents should be shredded and when.
The section on digital security should
  cover password management and electronic
  acceptable-use policy. Every employee
  should be provided with a standard computer
  setup to minimize the number of configurations
  that need to be managed and maintained—
  any employee wanting additional
  applications should be required to make a
  business justification for that application or
install that application himself.
Some applications require users to have
  administrative rights—rarely a good thing
  when you think of what users can do with
  those rights—so be careful when choosing
which applications to allow.
In some ways, digital security policy is
  easier to manage than physical security,
  because much of it can be enforced from the
  server. If you still have a peer-to-peer network,
  move to a managed domain as soon as
  possible. Windows Active Directory allows
  different usage policies to be applied to different
  users so, for example, financial
  records are only accessible to the accounting
  department and senior management,
  whereas documents like the employee handbook
are accessible to everyone.
If you don’t have the time or expertise
  in-house to create and implement serverbased
  policies, find an expert to help. But
  make the time to determine who can have
  access to what applications and under
  which circumstances. No one can implement
  a policy, standard or guideline for
  your business if they don’t know what is
  critical to the business. Remember, too,
  that this is all a work in progress and must
  remain flexible.