Happy New Year! Tech Solutions would like to wish you a happy, healthy, and PROSPEROUS 2016.
We’d like to help you start the New Year right, and what better way than a review of “Best Practices” with regard to your company’s computer network? Following are some of our most important recommendations for “proactive” rather than “crisis” computer network management.
• Install and maintain security software.
You need to make sure that your computer is running software that protects against malicious software. Viruses, spyware, or other potentially unwanted software can try to install itself on your computer any time you connect to the Internet or infect your computer when you use a CD, DVD, or other removable media.
This can result in ruined files, lost company info, company downtime, and costs to repair or replace.
Therefore, the first best practice is to install approved antivirus and antispyware software, Windows security patching, and other recommended safeguards, accompanied by professional software monitoring and management.
• Backup your data.
We can’t stress enough the importance of backing up your data—frequently. Situations beyond your control can occur and wreak havoc on your computer network: system crashes, hardware failures, or virus attacks, all of which result in downtime, increased costs, and possibly lost and irretrievable valuable company data.
We recommend backing up your files in multiple places using two different forms of media. There are fast and easy ways to backup these days, e.g., cloud storage, flash drives, and others; you hardly have to think about it at all once the backup of choice is implemented.
• Practice the principle of least privilege (PoLP).
This computer security term means, quite simply, don’t log into a computer with “administrator rights” unless you must perform specific tasks. Many CEOs do not realize that running your computer as an administrator makes your network vulnerable to security risks, damage, lost data, and hacking. When you must log in as administrator there are secure procedures that you should follow.
• Deploy encryption whenever it is necessary and available.
For highly sensitive data, such as financial, legal, or medical files, encryption is a process of encoding messages or information in such a way that only authorized parties can read it.
• Maintain current software and updates.
Install software that alerts you when your current software applications are out of date or require security updates.
Additional best practices to safeguard security and privacy for your company data and your employees include:
• Never share passwords or passphrases.
• Do not click random links.
• Beware of email/attachments from unknowns or with strange subject lines.
• Do not download unfamiliar software off the Internet.
• Log out of or lock your computer when not in use.
• Restrict remote access.
Some of the above suggestions can affect how your computers interact with the network. You should consult with a provider like Tech Solutions before making any changes to avoid disrupting your network connection.
You may have already implemented some of these best practices. If so, good for you. If not, contact us and we’ll be happy to provide you with maximum protection and maintenance of your computer network.
Take advantage of our FREE 2-hour service for new clients. Now that’s starting the New Year on the right foot!
Tech Solutions offers comprehensive IT Service and support for businesses, including onsite support, technology consulting, remote monitoring, maintenance, unlimited Help Desk support, and 24/7 emergency support. Call (888)225-2672 or email email@example.com. www.tsboston.com