Computer Security Tool Kit An E-security Resource 14811 N. Kierland Blvd. | Suite 100 | Scottsdale, Arizona 85254 1-866-265-8060 | www.viack.com | info@viack.com Computer Security Overview Every year, organizations both large and small lose millions of dollars in productivity, intellectual property theft and various legal and operational costs. In 2002, more than 60 percent of all corporate data assets resided unprotected on individual computers, according to published reports from the Search Security Newsletter. This startling statistic spells serious security trouble for organizations, not to mention the potential loss of proprietary information. To provide evidence that computer security should be a vital part of the corporate management function, VIACK Corporation shares these sobering statistics: • 92 percent of corporations and government agencies detected computer security breaches within the last 12 months; 75 percent acknowledged financial losses due to these breaches. (Source: 2003 Computer Security Institute/FBI Computer Crime & Security Survey) • The average financial loss from computer security breaches in 2002 was more than $2.5 million per company. The most serious financial losses occurred through theft of proprietary information. (Source: 2003 Computer Security Institute/FBI Computer Crime & Security Survey) • Disgruntled, former or fired employees, or even external service providers, are the most likely culprits of a security breach—anyone with insider information. It is for that reason that four out of five IT-related crimes are committed from within an organization. (Source: New Media Age, January 2002). While the number of high level executives involved in information security policy is on the rise, others have not been involved or don’t have a policy in place due to lack of awareness, time constraints or misconceptions that taking precautions will be expensive. In an effort to help C-level executives and IT managers work together to address security issues, VIACK’s Computer Security Tool Kit includes: • • • E-Liability Check List for the C-Level Executive – Six simple steps to start establishing a computer security policy. Five Questions Every CEO Should Ask Their IT Manager About Security – Basic questions to help guide initial discussions between the CEO and IT department to determine specific security risks in their company. Personal Computer Security Check List: Simple Tools for Every Employee – A check list to help remind employees of the simple steps they can take to reduce the risk of security breaches. 14811 N. Kierland Blvd. | Suite 100 | Scottsdale, Arizona 85254 1-866-265-8060 | www.viack.com | info@viack.com E-Liability Checklist for the C-Level Executive In 2002, more than 60 percent of all corporate data assets resided unprotected on individual computers according to published reports from the Search Security Newsletter. This startling statistic spells serious computer security trouble for organizations, not to mention the potential loss of proprietary information. So what can be done to safeguard your company? The following is an e-liability checklist to test your organization’s current computer security and level of e-communication protection. This list can also serve as a catalyst for an internal dialogue with your IT department to determine how your company can create and enforce a comprehensive policy to limit the risk of security breaches. • Create a protocol for downloading information and enforce compliance company-wide. It is important for employees to understand the potential hazards of downloading programs, software and other data to their individual computer desktop. By creating and enforcing a download protocol, employees can be aware of risks and IT departments can evaluate the safety of the source before allowing the completion of any downloads. • Choose a secure instant message (IM) software, and prohibit downloading all other nonsecure IM programs. IM usage is on the rise, and while it is an effective tool for quick and efficient communication, many IM providers did not design the software to be secure. In fact, most IM programs open up the desktop to prying eyes and completely circumvent firewalls. For business use, choose a completely secure, encrypted IM provider and establish a protocol to ban other non-secure IM programs. • Create a password protocol and enforce compliance company-wide. Establish a password policy that uses case sensitive passwords and that incorporates numbers and letters. Advise employees never to post or divulge passwords and to change their passwords frequently. Also advise against using the same password for multiple accounts or logins. • Establish an e-mail protocol and enforce compliance company-wide. Although easy, quick and effective, e-mail is not a safe communication tool for private or sensitive information. Establish a protocol that outlines what is acceptable to discuss via e-mail and what must be communicated through a more secure system – and enforce the policy company-wide. • Establish regulations for the creation and editing of secure documents. E-mails and non-secure IM are neither safe nor an effective way to draft and edit private documents. Both can be easily hacked, not to mention the risk of sending these documents to others inside or outside of the organization inadvertently. As an alternative, choose a secure e-communication software provider that allows for secure storage of documents and joint document editing. • Retain an IT professional and set up regular meetings to discuss computer security and establish a program to review your security protection measures regularly. Update the program as needed. Obtaining help from IT professionals gives an organization the guidance and expertise needed to establish a solid security program, ensure it’s working and keep it updated. Play it safe, create a foolproof plan with the help of a professional and keep your company information private and your communication secure. 14811 N. Kierland Blvd. | Suite 100 | Scottsdale, Arizona 85254 1-866-265-8060 | www.viack.com | info@viack.com Five Questions Every CEO Should Ask Their IT Manager About Security Scenario: Third quarter earnings have picked up thanks to a new and improved proprietary business strategy deployed by your executive team. You share this news via e-mail with your board of directors and key investors. Now imagine your largest competitor gets their hands on this critical information. How will you prepare for the fourth quarter damage? You may be surprised to learn that corporate e-mail interception happens every day to companies large and small. Last year alone, the theft of proprietary information caused financial losses of more than $70 million. More than $200 million total computer security related losses occurred, according to the Computer Security Institute, a San Francisco-based association of information security professionals, in its eighth annual “Computer Crime and Security Survey.” Salary data, confidential company financial information and much more is at stake if computer security is not a top priority for both top management and IT professionals. The following are five questions to ask your IT department to see if your company is on track to protect itself from hackers, loss of proprietary data and the myriad of other security and privacy threats: 1. Do we have a computer security program in place? Is it enforced at every level of the organization? What does it entail? These are important questions to ask because unless a security program is enforced company-wide, the entire organization can be at risk of viruses passed through e-mails and servers, or inadvertent leaks of information. Unless each and every employee has been given clear instructions on security standards, no amount of preventative efforts can stop a serious security breach. The program should include standards for instant messaging (IM), e-mail policies, virus protection, software security updates, password policies and specific instructions for employees to follow. 2. What is our privacy policy? Do employees understand the need for privacy and the appropriate ways to send sensitive information? How is this enforced? Beyond a company-wide security policy, privacy issues can be just as serious and threatening to an organization’s future. Employees at every level must be educated about privacy threats and the appropriate way to communicate sensitive data or other information both internally and externally. If email is not the best way to communicate certain information, you can provide employees with secure emeeting software or other solutions that they can use in place of e-mails or non-secure IM conversations. Ensure that whatever solution is implemented is easy for the end user. If it is too cumbersome, they may use other means or try to circumvent the policy. 3. Do we have a firewall? What does it protect? What doesn’t it protect? Understanding how a firewall can and cannot protect computer security is important – simply installing a firewall does not prevent the hacking of e-mails and IM applications or the possibility of other very serious security threats. Engage in an open dialogue with your IT department to understand how the firewall can protect your organization, which will also allow you to learn about other areas that are still vulnerable and how those can be protected. 14811 N. Kierland Blvd. | Suite 100 | Scottsdale, Arizona 85254 1-866-265-8060 | www.viack.com | info@viack.com 4. Do you know what software your employees have downloaded to their desktop? The availability of free software is prevalent on the Internet and many employees have the access to download as much software as they want. One such example is the use of instant messaging software, now rampant in the workplace. While this may seem like a convenient tool for instant communications, IM creates a portal to each and every desktop exposing risks beyond belief. Know what software is residing on your network and the risks associated with an open download policy. 5. What else can we do as an organization to make computer security a top priority for all employees? Your IT department is a valuable resource and the first line of defense against security leaks. Engaging in regular dialogue about trends, recommended programs, software and other security and privacyrelated issues with IT can help you create policies and procedures that will secure your organization and safeguard against loss of time, productivity, proprietary information and money. Taking the time to assess risks and current programs, as well as develop cost-effective solutions that your organization can easily implement will prove invaluable. Bottom line, consult your IT professional and keep your ecommunications safe. 14811 N. Kierland Blvd. | Suite 100 | Scottsdale, Arizona 85254 1-866-265-8060 | www.viack.com | info@viack.com Computer Security Check List: Simple Tools for Every Employee No matter how many times your IT department sends out e-mail warnings or mandates to employees encouraging them to secure their computer from viruses and hackers, ensuring that all company employees follow these guidelines is nearly impossible to enforce. The need for simple, easy-to-follow electronic communication guides is critical to protect your organization. The following check list is designed to help your organization manage security risks easily, at every level in the organization. This check list will provide employees with an understanding of what they can personally do, as well as offer tips on how to determine when and how to escalate information and concerns to IT management. • Do you know your IT contact? It is important to be aware of who your IT contact is to ensure that any problems with your password, laptop, data, etc. are reported immediately to the appropriate person. Consider placing their contact information in a visible area in your work space. • Immediately contact your IT manager if you receive suspicious or unrecognized e-mails or error notification messages on your computer. Do NOT open these messages! Often times, the damage is already done by the time the call to the IT department is made. • Restrict physical access to information by locking your computer when you are away from your desk. Your system will allow you to automate this procedure when you have not used your computer for a certain period of time. • Change your password every month, adding numbers and symbols to help lower the risk of someone accessing your information. Consider replacing letters with numbers, for example replacing the letter “A” with the “@” symbol, or the number zero for the letter “O”. • Are you downloading applications from the Internet or software from home? Check with your IT manager first. Some programs may be from questionable sources or could open your sensitive information and your company’s network to hackers, other intruders or viruses. • Check for computer viruses regularly and run daily software updates on your machine. • Back up your data after being certain that your computer is virus-free, and do it daily. • When, and if, you access your organization’s network while working from a home computer, be sure to save sensitive and confidential information on your company’s resources (their network), and not on your home computer desktop. • Stay up-to-date on the latest threats, viruses and solutions that you may hear about in the media or through memos from your IT department. • The number one tip: know your company security policy regarding sending sensitive and confidential information electronically via e-mail, instant messaging or inter-office mail and do your part to comply. The ability to protect your company from damaging or costly security breaches depends upon it. While some of these guidelines are the responsibility of the end user, often times your IT department can automate these tasks to make them seamless. When in doubt, ask! Where security of the network is concerned, they will be happy to help. 14811 N. Kierland Blvd. | Suite 100 | Scottsdale, Arizona 85254 1-866-265-8060 | www.viack.com | info@viack.com Conclusion After a company puts an appropriate computer security policy in place, it takes additional work to ensure compliance. It must include employees at all levels and an ongoing commitment on everyone’s part. Security is not just the concern of your company’s IT department; it is a shared and very personal responsibility. In addition to computer security guidelines contained within this tool kit, it is equally important to consider policies with respect to the following areas: • • • • Transfer of sensitive documents inside and outside of an organization Use of instant messaging services Collaboration and online meetings via the Internet Storage and access to confidential information If you would like additional information regarding guidelines and tips in these areas, please contact VIACK at pr@viack.com. 14811 N. Kierland Blvd. | Suite 100 | Scottsdale, Arizona 85254 1-866-265-8060 | www.viack.com | info@viack.com