Install a firewall and virus-checking on your computers.
Make sure that your operating system is set up to receive automatic updates.
Protect your computer by downloading the latest patches or security updates, which should cover vulnerabilities.
Only allow your staff access to the information they need to do their job and don’t let them share passwords.
Encrypt any personal information held electronically that would cause damage or distress if it were lost or stolen.
Take regular back-ups of the information on your computer system and keep them in a separate place so that if you lose your computers, you don’t lose the information.
Securely remove all personal information before disposing of old computers (by using technology or destroying the hard disk).
Consider installing an anti-spyware tool. Spyware is the generic name given to programs that are designed to secretly monitor your activities on your computer. Spyware can be unwittingly installed within other file and program downloads, and their use is often malicious. They can capture passwords, banking credentials and credit card details, then relay them back to fraudsters. Anti-spyware helps to monitor and protect your computer from spyware threats, and it is often free to use and update.
Consider whether the content of the email should be encrypted or password protected. Your IT or security team should be able to assist you with encryption.
When you start to type in the name of the recipient, some email software will suggest similar addresses you have used before. If you have previously emailed several people whose name or address starts the same way – eg “Dave” – the auto-complete function may bring up several “Daves”. Make sure you choose the right address before you click send.
If you want to send an email to a recipient without revealing their address to other recipients, make sure you use blind carbon copy (bcc), not carbon copy (cc). When you use cc every recipient of the message will be able to see the address it was sent to.
Be careful when using a group email address. Check who is in the group and make sure you really want to send your message to everyone.
If you send a sensitive email from a secure server to an insecure recipient, security will be threatened. You may need to check that the recipient’s arrangements are secure enough before sending your message.
Consider whether sending the information by a means other than fax is more appropriate, such as using a courier service or secure email. Make sure you only send the information that is required. For example, if a solicitor asks you to forward a statement, send only the statement specifically asked for, not all statements available on the file.
Make sure you double check the fax number you are using. It is best to dial from a directory of previously verified numbers.
Check that you are sending a fax to a recipient with adequate security measures in place. For example, your fax should not be left uncollected in an open plan office.
If the fax is sensitive, ask the recipient to confirm that they are at the fax machine, they are ready to receive the document, and there is sufficient paper in the machine.
Ring up or email to make sure the whole document has been received safely.
Use a cover sheet. This will let anyone know who the information is for and whether it is confidential or sensitive, without them having to look at the contents.
Other security measures
Shred all your confidential paper waste.
Check the physical security of your premises.
Staff training and security
Train your staff:
so they know what is expected of them;
to be wary of people who may try to trick them into giving out personal details;
so that they can be prosecuted if they deliberately give out personal details without permission;
to use a strong password – these are long (at least seven characters) and have a combination of upper and lower case letters, numbers and the special keyboard characters like the asterisk or currency symbols;
not to send offensive emails about other people, their private lives or anything else that could bring your organisation into disrepute;
not to believe emails that appear to come from your bank that ask for your account, credit card details or your password (a bank would never ask for this information in this way);
not to open spam – not even to unsubscribe or ask for no more mailings. Tell them to delete the email and either get spam filters on your computers or use an email provider that offers this service.
Comments are closed.
Nixon Williams Cat 5e network cabling of offices
Nixon Williams Accountants
After a flood in our offices, I needed to find a reliable local cabling company who would be able to come out as a priority, access the damage and produce a full proposal at extremely short notice. Cloud9 were great, when I explained our situation, they agreed to come out as an emergency and were