Nine Steps to Smart Business Security - Slide 5

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Nine Steps to Smart Business Security-5 Next

Draw up a list of "do's and don'ts" to ensure your employees follow the essential rules needed to safeguard sensitive data and critical business services. Ensure these rules are regularly reviewed and updated. Examples might include:

- Choose strong passwords and change them regularly - Share customer data with outside parties
- Lock away laptops and sensitive data when the office is vacated - Leave mobile devices unattended in public places
- Take regular backup copies of your data
- Apply critical security updates and antivirus updates promptly

In a larger business, a written policy, setting out principles and objectives in a more structured manner, is a better source of guidance for managers and staff. Procedures for key security processes, such as controlling access rights, issuing equipment and taking backup copies, should also be defined, along with responsibilities for keeping them current.

Small enterprises are the engine of our economy, generating innovation, employment and wealth, so your security matters. Data breaches are bad for business, so every enterprise needs security. In the past, this was expensive, because security products were designed for companies with deep pockets and teams of experts. But that’s changed. New cloud-based services are fast to deploy, safe and easy to use. What’s more, they’re even more affordable.

With growing demands from customers and regulators for security, now is a good time to invest in security. Leading cloud-based security services deliver a professional level of security assurance in a form that fits the circumstances and pockets of small businesses.

This slideshow features nine steps, identified by Qualys, that businesses can take to reduce risks at an affordable price.


Related Topics : Cloud Computing, Dell, Services Vendors, SMBs, Web Platform Vendors

More Slideshows

cloud51-190x128 5 Best Practices for Managing Zombie Cloud Infrastructure

IT administrators need to identify zombie assets, verify idle status and shut off anything that is unused. Here's how to get your dormant infrastructure back in shape. ...  More >>

cloud50-190x128.jpg How to Use the Cloud to Become a High-Velocity Business

Cloud SaaS adoption allows organizations to gain the flexibility and scalability necessary for creating a high-velocity business. ...  More >>

DynCloudInternetVisibility0x 8 Reasons the Enterprise Needs More Visibility into the Cloud

IT executives need the right tools to monitor and control their cloud infrastructure to maximize the positive impacts and mitigate security threats. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.