News
News
4/25/2007
08:35 AM
Connect Directly
RSS
E-Mail
50%
50%

5 Cheap But Effective Tips To Improve Security

Periodically check for rogue wireless access points, plus four other simple, yet inexpensive, improvements you can implement to boost the security of your enterprise.

While a lot of security technologies come with impressive price tags, there are some fairly inexpensive things you can do to make your enterprise more secure.

We picked the brains of a handful of security experts and got their ideas for the five cheapest security changes that would have the most impact. We skipped the obvious choices, like creating more complicated passwords and not leaving the door to the building or the server room open. The experts gave us suggestions that ranged from using digital signatures on all sent e-mail, to what to not allow into the system, and what might be hidden in the office.

"There are things you can do to secure your network without it taking a hit on your budget," said Brian Dykstra, a senior partner with Jones, Rose, Dykstra & Associates, a computer security and training company. "One of the biggest mistakes people make is to think they can't afford to make any changes so they bury their heads in the sand. That almost always leads to a bad situation."

Here are five suggestions:

  • Periodically check for rogue wireless access points in corporate buildings.

    The problem here is that some companies don't have wireless access or they have restricted access, and some users will think they can sneak their own wireless access points in to make their lives a little easier. Maybe they want wireless from a conference room or from their desk. They set it up without IT's knowledge, or guidance, and they often leave it unsecured.

    That means a hacker who is targeting the company now has an open door into the network. "There's always rogue access," said Dykstra. "It's under the desk, or stuck behind a desk drawer. In any kind of large environment you go into, you'll find a couple of them. The IT managers will always say, 'Oh no, no. Not us.' And then you find the Linksys access setup."

  • Enable Windows Update on all computers..

    However, be sure to remember to verify that the systems actually are being patched, said Ken van Wyk, principal consultant with KRvW Associates.

    It's an easy step that will ensure that systems are patched as soon as possible, but Dykstra said it's "stunningly amazing" how many companies don't take advantage of it. "Whenever I'm teaching, people stop me and ask what they should do on their own computer to improve their security," he added. "I tell them to enable Windows Update. Let it automatically accept all [the patches] all the time. Your average non-IT person isn't going to make a smart choice about what patches they need."

    Another thing to keep in mind, though, is that not every computer will accept the patch update. Some glitch is going to shut down the update process before it's done and if the IT manager doesn't verify that it's gone through, an unpatched computer could put the whole network at risk.

    "Sometimes you'll go back and find out that there's a machine that always denies a patch," said Dykstra. "And here you thought you didn't have to think about this process, but this machine was actually never being updated. That's fairly common in a big environment."

    Previous
    1 of 2
    Next
    Comment  | 
    Print  | 
    More Insights
  • IT's Reputation: What the Data Says
    IT's Reputation: What the Data Says
    InformationWeek's IT Perception Survey seeks to quantify how IT thinks it's doing versus how the business really views IT's performance in delivering services - and, more important, powering innovation. Our results suggest IT leaders should worry less about whether they're getting enough resources and more about the relationships they have with business unit peers.
    Register for InformationWeek Newsletters
    White Papers
    Current Issue
    InformationWeek Must Reads Oct. 21, 2014
    InformationWeek's new Must Reads is a compendium of our best recent coverage of digital strategy. Learn why you should learn to embrace DevOps, how to avoid roadblocks for digital projects, what the five steps to API management are, and more.
    Video
    Slideshows
    Twitter Feed
    InformationWeek Radio
    Archived InformationWeek Radio
    A roundup of the top stories and trends on InformationWeek.com
    Sponsored Live Streaming Video
    Everything You've Been Told About Mobility Is Wrong
    Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.