Today we want to present several cases of security in the company because it does not always work optimally. These are typical questions that the bosses ask when working with an online project and it is logical that we give you some guidelines so that you can improve computer security.
What would happen if we did not follow these tips? In principle, nothing has to happen. All safety must be first "preventive", since if we avoid the problem before it happens,
1. We have a lot of social networking accounts, servers, blog, web pages. New workers and fellows have access. Is it appropriate to work like this?
For further online security, the latest management accounts should be in the hands of the owner or owners of the company . In most online services in the cloud, we are allowed to define the permissions of each user.
So in Facebook, for example, employees, fixed or sporadic, should be discharged as "content creators" . To use Twitter, it can be done from a Hootsuite account. The administrator, able to register new pages or delete the new one, should be in the hands of the boss.
Not for lack of trust in employees, but for greater security "online capital" of the company . The people responsible for creating content must have access, but ultimately, the "administration" to invite new users and change the password must be in the hands of the boss. Remember also that you create secure passwords to prevent theft.
2. Who should read and respond to company email? What is the system you should follow to use it safely?
In this there are usually some problems because many pages receive their emails created on their own server "info@tuservidor.com", but not redirected them to an email that they can read. Nor do they enable Gmail to send emails from that account.
Responsible for reading and responding to email , ie to carry out the customer in this way, may be the employee who has been assigned that task and no problem in having the password. Now some things have to be taken into account.
- It is convenient to have different emails for each thing. One for the administrator, another for customer service, etc. So that the information is separate.
- Have enabled some spam filters suitable.
- Use a good antivirus that analyzes mail for security if necessary.
- Follow rules for not opening unknown email attachments, nor for alleged banks that ask us for personal information.
- Copy the text signed compliance with the Data Protection Act , by which you commit to erase from the database an e-mail if you request so its owner.
3. How do you make sure that you are not stealing bandwidth, or are you spying on me from? What can I do to prevent it?
If you notice that your Internet connection slows performance , it may be due to a variety of factors. In any case, it is ideal for a reliable computer technician to go to your company and check the security of your network.
The same can be said for spyware or spyware. It is advisable to spend a anti-spyware program to ensure that no undesirable are monitoring our network.
Have your doubts clarified these three questions and answers? If so, I ask you to share this article in social networks and leave me a comment below. What other doubts do you have about computer security in your company?
0 comments:
Post a Comment