Swine Flu not the only virus going around, warns IT expert
6 Oct 2009
Any employee who connects hardware that has previously been connected to the internet outside of the company’s perimeter defences, or uses a USB key, is by-passing this vital protection and is a serious threat to the integrity of the company’s IT system,
London - Managers and IT specialist should ‘think virus’ and not just the H1N1 Swine Flu variety, according to David Robinson, UK general manager, Norman Data Defense. He offers five top tips for businesses to counter the risk of employees by-passing a company’s defences against malware, viruses and hackers.
Any employee who connects hardware that has previously been connected to the internet outside of the company’s perimeter defences, or uses a USB key, is by-passing this vital protection and is a serious threat to the integrity of the company’s IT system, warns Robinson. Laptops, he adds, may not be conditioned to update virus checkers as regularly as a server, which puts the entire network at risk.
“The point at which a standard security package will identify viruses introduced from inside the network is usually too late, putting any equipment attached to the network at risk. File sharing, transferring data on portable data devices, email from unprotected home PC’s or home wireless networking increases considerably the chances of malware entering a network,” said the IT security expert.
While it’s vital to protect against threats from outside the company’s IT infrastructure, an unintentional ‘inside job’ can cause as much disruption to business, warns Robinson, who has developed five points to help organisations to reduce the impact of home workers inadvertently spreading computer viruses and malicious software.
1. Develop a robust IT security strategy so that all employees know what they can and can’t do, and the implications of their actions in not following the guidelines.
2. Ensure that home PC’s are adequately protected against malware and viruses.
3. Install network protection hardware to catch any malicious software from inside perimeter defences.
4. Encourage employees to email their documents from a machine with up to date virus protection to the office, rather then bring them in on portable storage devices.
5. Ensure that anyone using wireless connections outside of organisational control only use WEP enabled systems that require a passcode to connect.