Making IT Your Business

Company security is everyone's responsibility

Sometimes it seems as if everything is about security these days. Homeland security, physical security, digital security— there’s constantly a new security issue that needs attention.

The common thread, and threat, in all these areas is people. You can’t lock up your staff or seal their mouths, so you need a process to keep your most valuable assets from turning into your worst nightmare. There was a lot of truth behind the old wartime saying “loose lips sink ships.” Businesses have many areas of risk that are as vulnerable to careless behaviors and communication as the Atlantic convoys were during World War II.

Homeland security affects travelers and anyone near a critical area. Physical security affects people who use keys to enter a facility or who must remember to shred a sensitive document. Digital security affects people every time they turn on computers and includes passwords, anti-virus software to protect systems online and backup systems to get users back on track if something happens.

While most people don’t have a lot of individual control over homeland security issues, employees are able to control many aspects, both physical and digital, of their business security by creating and implementing a security policy—the glue that holds it all together and gives businesses a fighting chance at survival. The layered security model shows how important such policy is in securing a business.

Beyond Common Sense
Most actions taken are common sense, but it can be surprising how many small businesses skip one or more of the essentials. Whatever else you economize on, smoke detectors, an alarm system and a fireproof safe should not be among them. But what about the paper shredder? And do you keep a record of the number and distribution of master keys? Yes. If you don’t know who has keys and where those keys are at all times, the door might as well be wide open.

Physical security starts with good insurance. It’s important that the insurance policies you choose to protect your business are the right ones. Help your insurance agent understand your business and what is most valuable to you. Most insurance policies offer discounts on a sliding scale, depending on what you do to protect the business.

Physical security also is essential for critical servers and other computers. A motivated person with physical access can get into any Windows®-based device without knowing the user name or password— something you need to remember when putting a basic security policy together.

New Challenges
Passwords need to be hard to guess and changed frequently, which all too often means that people write their passwords down. For every manager who keeps his or her passwords in a “little black book” that’s stored in the fireproof safe, there are 10 employees whose desks are littered with password-inscribed Post-it® notes.

Passwords go some way toward protecting laptops left in taxicabs, for example, but a better way to go is to make it policy to encrypt laptop hard drives. Encryption software is easy to use, widely available and inexpensive. It will nearly guarantee that a thief can’t access the data stored on the machine. It’s also about the easiest way there is to ensure that your business is in compliance with government regulations regarding data protection and privacy.

You’ve probably figured out how to manage virus, spyware and spam problems. But what’s going on now on the Web is entirely different. The game has changed dramatically—and so have the risks.

Organized crime has taken to the Web in a big way. The criminals—and their digital weapons—can be completely invisible. One pixel on the screen can hold a poison dart that can exploit a common software application like Internet Explorer and steal information without anyone noticing. Microsoft’s much-vaunted “Patch Tuesday,” when security fixes are released, is now routinely followed by “Exploit Wednesday.”

Your employees also are busy adding new programs to their systems that make them even more susceptible to security breaches. Social networks like Facebook and IM and VoIP applications like Skype are tunneling into and out of your business. If you thought keeping control of spam and stopping users from opening e-mail attachments was tough, welcome to the brave new world of Web 2.0.

Web 2.0 is all about two-way, synchronous communication. All of the abovementioned activities might be convenient for getting business done, and can save a considerable amount of money, but they come at a cost.

Business Security Resources

General business security information:
Small Business Administration: www.sba.gov

Allbusiness.com, a portal for everything related to managing a business effectively: www.allbusiness.com

Local chamber of commerce—often a great resource. If there’s a local technology group, as well, join it.

Training and security information:
Tips for businesses to protect personal information: www.ftc.gov

NCSA resource—Stay Safe Online: www.staysafeonline.info

Security awareness training course: irtsectraining.nih.gov

Home network security: www.cert.org

Identity theft resources: www.ftc.gov

Policies, standards and guidelines:
SANS security policy resource page—probably the best place on the Web to start when creating a security policy. There are free examples here, but make sure you consider all aspects of securing your business. www2.sans.org

Saving money means a trade-off elsewhere. And in the case of these real-time activities, the big downside is lack of security. Sharing data and keeping that data secure is like mixing oil and water. You can either share data or secure data, but not both. And while it would be nice to simply lock everything down and block consumerdriven applications, it’s simply not realistic to expect users to live with that level of inflexibility—or they’ll be spending half their time trying to get around it.

Computer security is an ever-changing landscape. At a minimum, users need antivirus, anti-spyware, anti-exploit, antispam, firewall, encryption and backup— and everything needs to be kept up to date at all times. Plus, security measures need to be as transparent to your users as possible. If security gets in the way of working, users will work around it.

If you’re like most small businesses, you simply don’t have the bandwidth, the manpower or the expertise to deal with all of this. So you need a reseller or consultancy with security expertise to help guide you through this security maze.

The Human Factor
People security starts with the hiring process. It’s so easy these days to check a person’s history online that there’s no reason not to do it, and there are plenty of reasons why you should. There are firms that will do this for you, as well, but be sure that when you search under the term “background checks” the site you click on is not dishing out malicious code.

Make security part of the new-hire orientation process. If you can educate your people to understand the risks they are exposing the business to with some of their behaviors, there is a good chance you can start to tilt the balance in your favor. It only takes one weak link to break the security chain and potentially expose everyone to the risk.

The big roadblock for businesses implementing training and awareness programs is time. Security training is crucial to business. Since time also is crucial, find a way to make ongoing security training relevant and fun. Make it worth the employees’ time to understand why security is so important to the business.

Tying it All Together
Security awareness really needs to be embedded in the fabric of your business, which means policies must be in place for all aspects of security. Make security part of everyone’s routine by establishing security policies in writing and making sure they’re implemented correctly. Repetition, consequences and follow-through will pay off.

The section of the policy on physical security needs to cover, at a minimum, essentials like who has keys to what, the process for issuing new or replacement keys, changing smoke alarm batteries, alarm-setting and maintenance responsibilities, and the factors that determine which documents should be shredded and when.

The section on digital security should cover password management and electronic acceptable-use policy. Every employee should be provided with a standard computer setup to minimize the number of configurations that need to be managed and maintained— any employee wanting additional applications should be required to make a business justification for that application or install that application himself.

Some applications require users to have administrative rights—rarely a good thing when you think of what users can do with those rights—so be careful when choosing which applications to allow.

In some ways, digital security policy is easier to manage than physical security, because much of it can be enforced from the server. If you still have a peer-to-peer network, move to a managed domain as soon as possible. Windows Active Directory allows different usage policies to be applied to different users so, for example, financial records are only accessible to the accounting department and senior management, whereas documents like the employee handbook are accessible to everyone.

If you don’t have the time or expertise in-house to create and implement serverbased policies, find an expert to help. But make the time to determine who can have access to what applications and under which circumstances. No one can implement a policy, standard or guideline for your business if they don’t know what is critical to the business. Remember, too, that this is all a work in progress and must remain flexible.

Featured

  • It's Show Time

    I am one of those people that likes to see things get bigger and better. As advertised, ISC West is going to be bigger (more exhibitors) and better (more attendees). It’s show time in Las Vegas. Read Now

    • Industry Events
    • ISC West
  • SIA Releases New Report on Operational Security Technology

    The Security Industry Association (SIA) has released an impactful new resource – Operational Security Technology: Principles, Challenges and Achieving Mission-Critical Outcomes Leveraging OST. Read Now

  • Cyber Overconfidence Is Leaving Your Organization Vulnerable

    The increased sophistication of cyber threats pumped by the relentless use of AI and machine learning brings forth record-breaking statistics. Cyberattacks grew 44% YoY in 2024, with a weekly average of 1,673 cyberattacks per organization. While organizations up their security game to help thwart these attacks, a critical question remains: Can employees identify a threat when they come across one? A Confidence Gap survey reveals that 86% of employees feel confident in their ability to identify phishing attempts. But things are not as rosy as they appear; the more significant part of the report finds this confidence misplaced. Read Now

  • Mission 500 Debuts Refreshed Identity Ahead of Security 5K/2K at ISC West

    Mission 500, the security industry’s nonprofit charity dedicated to supporting children in need across the US, Canada, and Puerto Rico, has unveiled a refreshed brand identity ahead of ISC West. The charity’s new look includes a modernized logo with refined messaging to reinforce Mission 500’s nearly decade-long commitment to serving the needs of children and families in crisis. Read Now

    • Industry Events

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.