Get premium membership and access questions with answers, video lessons as well as revision papers.
Got a question or eager to learn? Discover limitless learning on WhatsApp now - Start Now!

Key security protocols business owners should have in place

  

Date Posted: 1/10/2013 5:28:18 AM

Posted By: billgates  Membership Level: Silver  Total Points: 446


Today, many businesses, whether large or small are constantly under cyber threat. Many small business enterprises are never concerned with their information security because of their small sizes. However, this has the potential to bring dire consequences to the business in question.

Because there is laxity in information security among small enterprises, this makes them rich fodder for cyber criminals. These criminals will look if document shredding is done on a regular basis, or if files are not being backed up. Because business owners often pay little attention to this, something as little as an email could result in a virus being introduced to the office network. However, there are a number of things a small business enterprise can do to protect it from incurring unnecessary financial cost or inappropriate inter office file sharing.
One of the most effective forms of enhancing security in a small business is through educating members and clearly highlighting measures that could be taken upon an individual who breaches them.

This can be done through setting up an employee education program. Once you do that, put your protocol in clear writing and educate your staff about them. But remember to keep them brief and easy to understand.

Ensure that you have data recovery devices installed in every computer at the office. You can purchase the latest software that monitors chats, web traffic and email. This is because these modes of communication are prone to malware and viruses. Don’t forget to update your anti-virus and spyware.
All employee data should be stored on a separate network. Whether you have few employees or many of them, it is wise to do so because criminals have the capability of injecting PDF files with virus.

If you have assigned every employee with a device like a laptop computer, ensure that they don’t access public WiFi

networks with them. This is because cybercriminals are always on the look for unprotected networks. In fact they should all have pin numbers for their mobile devices.
And when it comes to document shredding, you have to be extremely careful. Do not throw any document into the litter bin. This is because personal information or a client’s details might get into wrong hands and you could be sued.



Next: Because of man's greed, curse came upon him
Previous: Kenyans must learn to live in harmony

More Resources
Quick Links
Kenyaplex On Facebook


Kenyaplex Learning