Information security is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (e.g. electronic, physical). CTG works with client’s to ensure their information is secure, and practices are in place to ensure both the physical and the network aspects of that security.
When we think of Information Security, we often think of firewalls, routers and password protection. But it’s actually much more than that. Information security is the process of protecting the value and integrity of data… and that starts when you first walk in the door. Here are some basic tips and questions to consider during the process of establishing security for your office. While no system is guaranteed, it’s a great place to start:
Physical measures such as office cameras and internet ready DVR will give you the ability to monitor persons entering and exiting your offices. Cameras give you plausible deniability should you need it, and will provide aid with legal issues that might occur. Locks and restricted access to network closets and server rooms are a must.
Here are some more ways CTG has worked with clients to restrict access/entry in your building, server rooms, and remote areas:
- Replace all key locks if you haven’t already done this.
- Install keypads which require a unique number code to unlock the door.
- Depending on the sensitivity of your data, consider implementing biometrics with options such as: thumbprints, handprints, and iris scanners.
- Consider Rfid (radio frequency identification). Rfid uses any number of cards, tokens or items that use radio frequency to unlock doors.
Trust CTG to work with your environment, determine what is possible and necessary for your security, and evaluate the cost vs. risk assessment to work within your budget.
Network and Infrastructure Security
Network Infrastructure Security refers to the process of protecting data integrity. Network security can range from firewalls to antimalware, to simple password protection. We’ve developed a list of items that every business should have in place if you secure outbound to inbound traffic. Let’s start with the necessary equipment:
Firewalls are a must. They provide unauthorized access protection to your network. Firewalls filter the information passed through them, allowing only approved content through. They can also be very complex to administer throughout an organization, and are often times the main culprit when a new application you are running on your network doesn’t work. CTG offers network monitoring and management of your firewalls and networks so you don’t have to.
Antivirus and Malware:
These programs protect your network from hacking and viruses, and dangerous spyware which can steal private company or customer data. Choosing strong antivirus software is one of the easiest ways to protect your systems and improve your network security, but there are many options available. And these programs only work as well as the updates and scans your devices have…Antivirus and Malware software should be scheduled to scan your network weekly to detect any potential threats. CTG offers solutions for device management and monitoring, ensuring your systems are up to date.
Secured networking routers and switches:
This internal networking equipment security features: Securing Network Switch ports, Securing DHCP, Securing ARP. CTG can help you acquire and maintain this equipment and also provide patching for networking gears to protect from holes.
Regular security audits and penetration tests are one of the best ways to measure and identify gaps in your network security. They will highlight the vulnerabilities and show how they can be exploited. CTG can then work with you to develop a plan to correct any potential issues and install or upgrade equipment to protect your network long term.