Best Practices: Protect Your Company’s Computer Network

Happy New Year! Tech Solutions would like to wish you a happy, healthy, and PROSPEROUS 2016.

We’d like to help you start the New Year right, and what better way than a review of “Best Practices” with regard to your company’s computer network? Following are some of our most important recommendations for “proactive” rather than “crisis” computer network management.

Install and maintain security software.

You need to make sure that your computer is running software that protects against malicious software. Viruses, spyware, or other potentially unwanted software can try to install itself on your computer any time you connect to the Internet or infect your computer when you use a CD, DVD, or other removable media.

This can result in ruined files, lost company info, company downtime, and costs to repair or replace.

Therefore, the first best practice is to install approved antivirus and antispyware software, Windows security patching, and other recommended safeguards, accompanied by professional software monitoring and management.

Backup your data.

We can’t stress enough the importance of backing up your data—frequently. Situations beyond your control can occur and wreak havoc on your computer network: system crashes, hardware failures, or virus attacks, all of which result in downtime, increased costs, and possibly lost and irretrievable valuable company data.

We recommend backing up your files in multiple places using two different forms of media. There are fast and easy ways to backup these days, e.g., cloud storage, flash drives, and others; you hardly have to think about it at all once the backup of choice is implemented.

Practice the principle of least privilege (PoLP).

This computer security term means, quite simply, don’t log into a computer with “administrator rights” unless you must perform specific tasks. Many CEOs do not realize that running your computer as an administrator makes your network vulnerable to security risks, damage, lost data, and hacking. When you must log in as administrator there are secure procedures that you should follow.

Deploy encryption whenever it is necessary and available.

For highly sensitive data, such as financial, legal, or medical files, encryption is a process of encoding messages or information in such a way that only authorized parties can read it.

Maintain current software and updates.

Install software that alerts you when your current software applications are out of date or require security updates.

Additional best practices to safeguard security and privacy for your company data and your employees include:

• Never share passwords or passphrases.
• Do not click random links.
• Beware of email/attachments from unknowns or with strange subject lines.
• Do not download unfamiliar software off the Internet.
• Log out of or lock your computer when not in use.
• Restrict remote access.

Some of the above suggestions can affect how your computers interact with the network. You should consult with a provider like Tech Solutions before making any changes to avoid disrupting your network connection.

You may have already implemented some of these best practices. If so, good for you. If not, contact us and we’ll be happy to provide you with maximum protection and maintenance of your computer network.

Take advantage of our FREE 2-hour service for new clients. Now that’s starting the New Year on the right foot!

Tech Solutions offers comprehensive IT Service and support for businesses, including onsite support, technology consulting, remote monitoring, maintenance, unlimited Help Desk support, and 24/7 emergency support. Call (888)225-2672 or email

Zoom zoom…

Bank Wire Fraud

We have been apprised about a very aggressive form of fraud going around now, and we just wanted to give you a heads up.

What will usually happen is an email from a Top Executive (John Smith) will go to the CFO/Accountant, etc and say something to the effect of:

“Dear Bill, We have been looking into acquiring another company in City/State/Country, and will be moving forward in acquiring this company in XXX. Please keep this strictly confidential. In the next few days, a Mr. William Tate (or whatever name they choose) will be contacting you regarding this. Please coordinate with him anything he will need for this acquisition, etc etc”

In a couple of days, you will probably get an email or even a phone call from “William”. He will probably tell you that he is reaching out to you, and that John Smith wanted him to reach out to you. He will then start to discuss a wire transfer. And in short, after this wire transfer is completed, you will never see the money again.

They are getting pretty sneaking and bold. Not to get too technical, however, the email may “look” like it’s from the President/Exec, however, hidden in every email is a ReplyTo that will basically route your reply to the scammer and not the Exec. Very sneaky, but effective.

Our recommendation is to have ANY and ALL bank transfer requests, or even unusual check requests or invoices, to have a verbal confirmation from the Executive themselves, no matter how desperate the email sounds. If we remain alert and vigilant, we can stop these frauds before they start.