RSS TECHNOLOGIES - Wooster, OH 44691 Serving Small Business  

RSS Technologies
Wooster, Ohio
(330) 204-1742
San Antonio, Texas
(210) 999-7566
  Security 101

Security Guidelines
Where do I start? Security 101, a lesson in basic recommended security practices
I am ready to go online, what next?
Taking a pro-active stance: Assessing your system vulnerability and shoring up the defenses.
Best Practices: Following these 10 basic steps can greatly reduce your chance of being compromised and can reduce unexpected and unwanted expenditures. Steps 1-5
Best Practices: Steps 6-10

Security 101 Continued - Best Practices
The 10 Steps - continued
  1. Web Browsers: - Know your web browser. Check for known vulnerabilities, updates and patches on a regular basis. The procedure will depend upon the web browser you are using. Check your vendors help files or website for more information. Make a point of familiarizing yourself with your browsers various security settings and how they can improve your online security. For Microsoft Internet Explorer, there are a few articles worth reviewing:
    For other browsers, see you vendors support pages.

    To test your browser online, you can visit Browser Security Check.

  2. Secure Wireless: -


  3. Firewall: - Firewalls are a protective barrier between your computer and the outside world. They generally come in two forms, software firewalls and hardware firewalls. A good firewall will filter unauthorized and potentially dangerous data from the Internet while still allowing legitimate data to reach your computer and should block unauthorized data coming from your computer. These days, whether you connect to the internet via dial-up or broadband, you should always have a functioning firewall. RSS Technologies recommends Zone Alarm (they also provide a free version for home users). We also recommend a multiple-layer defense. For example, if you are using a broadband connection you should use a router/gateway with a built in firewall and also run a software firewall on all individual machines within your local network. Keep intruders out!


  4. Backup data: - As a rule, passwords should always be at least 8 characters long and consist of some combination of all of the following: numbers, uppercase letters, lowercase letters and special characters. They should be random and hard to guess. Change passwords regularly, at least every 90 days. Never share passwords with unauthorized persons.


  5. Implement company wide enforced security policies: -


  6. Wipe data from old pc's: -





If you have any questions that need immediate resolution, please feel free to contact us via email or use our online form.


Tool Box

Business Security - From Dept. of Homeland Security
Stay Safe Online - National Cyber Security Alliance
Federal Trade Commission - Consumers and businesses information about computer security and safeguarding personal information
Visit our on-line tutorial
Security 101: A guide to proper security practices for all PC users.
Order (free of charge) the Windows XP Service Pack 2 CD. Update your PC to ensure the most up to date security.
Download
Microsoft Security Guidance Kit. Tools, templates, roadmaps and how-to guides in addition to Microsoft's prescriptive security guidance. The most current information can be found at the Microsoft Security Guidance page.
http://www.microsoft.com/windowsxp/using/setup/learnmore/bott_03july14.mspx
http://www.microsoft.com/security/incident/settings.mspx-Help Increase Your Browsing and E-Mail Safety
http://www.microsoft.com/security/incident/default.mspx-security alerts and information


© Copyright 1999-2007 RSS Technologies. All rights reserved.
Wooster, Ohio - San Antonio, Texas

Legal notices and trademark copyrights
Home | Services | Security | Networking | Telecom | Web Design | Support | Solutions | About Us | Contact Us
Net Integrator Servers | Micro | Micro II | Mark I | Mark II | Nitix Server OS

Site Map | Pavo News | Tu Rom Network Techniques