Already on ArticleSlash?

Forgot your password? Sign Up

Computer Security - Protect Your Business in 3 Simple Steps


Visitors: 321

For most small business owners and managers, computers are a necessary tool of the trade. Whether they embrace technology with open arms or barely tolerate it, there’s no escaping the fact that very few businesses operate without at least one PC to manage email, accounts and a wide range of other functions.

But as we become more and more dependent on technology, we become more and more vulnerable to the impact of computer downtime and security issues.

The biggest threat in terms of computer security is not viruses, hackers or spyware. It’s ignorance.

You hear about this stuff in the media, but do not really understand it, and so do nothing. After all, it would cost a fortune to implement an effective solution, right? And besides, the people telling you about the threats are the same ones who are trying to sell the solutions so who can you trust.

The truth of the matter is that computer security is a critical area for any business. In the same way that you do not leave the outside door swinging open when you head for home each evening, you have got to put reasonable measures in place to keep out any prospective criminals. For most of us, that means locking the doors and setting an alarm. In some cases, more strict measures are required; Security Guards, 24x7 monitoring, more intelligent alarm and detection systems.

The key point to remember here is that computer security is primarily about security, not computers! And while security of any type cannot provide 100% guarantees, you can achieve relatively effective security levels without breaking the bank or having to hire an IT guru.

So what can you do to reduce the risk of computer outages? What measures can you implement to protect your computer, your data and ultimately your business?

According to Microsoft, there are three steps to computer security heaven; install a firewall, apply security patches and ensure you have properly maintained anti-virus software. Obviously in a business environment there may be additional layers of complexity but the underlying principles remain the same.

A firewall is a piece of hardware or a program that acts as a gateway between your computer or network and the outside world. It will monitor all incoming and outgoing data and only allow the type of traffic you permit. With Windows XP, Microsoft introduced a basic firewall. Configuring the Windows XP firewall is relatively simple and will provide you with a basic level of protection that will be sufficient in many cases. Other vendors also offer free desktop firewalls, ZoneAlarm being one of the most popular.

Security patches are fixes released by Microsoft for security-related bugs discovered in their products. When a fix is released Microsoft issue details of the exposure along with the fix. Unfortunately what this means is that anyone with the technical know-how can develop a virus or program to exploit that bug on any machines that have not been patched. In 1999, the gap between the publication of vulnerability and the discovery of a program exploiting it was 288 days. In 2004 it was 10 days. In 2007, 0-day exploits are commonplace. Therefore it is important that patches be applied as early as possible to protect yourself.

The third step in the process is to ensure you have a properly maintained anti-virus solution. Very few of us fail to realise how important it is to have anti-virus software installed, but when is the last time you checked to see if it was updating properly? Out-of-date or badly configured AV software give you little or no protection. Regardless of the product you use, the key thing is to ensure your program is updating itself as frequently as possible. That ensure it is properly equipped to combat the newest viruses as soon as they appear. The other key aspect of any virus protection software is real-time protection, which allows it to scan files as they are being accessed.

None of the measures outlined above are expensive to implement, and all could potentially save you a lot of heartache. Once these are in place, you will need to look at passwords, spyware protection, backups and so on. However, these ensuring you have covered these three areas effectively will be a very important start on the road to effectively protecting your business.

Tony Murphy is MD of Energize Computing and author of Know Your Enemy, Know Yourself - The Art of Computer Security For Business Owners & Managers. For more details visit or read Tony’s blog on Copyright 2007 – Tony Murphy. All Rights Reserved Worldwide. Reprint Rights: You may reprint this article as long as you leave all of the links active, do not edit the article in any way, give author name credit


Article Source:

Rate this Article: 
More Fast Food Restaurants are using Security Camera Systems to Protect their ..
Rated 4 / 5
based on 5 votes

Related Articles:

Protect your family; protect your business with the best security cover

by: Chris Nguyen (March 28, 2016) 
(Home and Family/Home Security)

Protect Your PC From Spyware In 9 Simple Steps

by: Steve Ross (February 28, 2007) 
(Computers and Technology)

How Can You Protect Your Assets Before Divorce Simple Steps

by: Navneet Brar (June 29, 2008) 

Simple Steps To Avoid Tinnitus And Protect Your Ears!

by: John Currie (April 22, 2008) 
(Health and Fitness/Ears Hearing)

Protect your home and business with the help of security cameras

by: Henry J Williams (September 20, 2011) 
(Business/Customer Service)

Bullying Can Cause Brain Damage! 5 Simple Steps A Parent Can Use To Protect ..

by: Adam Blum (February 10, 2010) 
(Home and Family/Parenting)

Endpoint Security Suites To Protect Business Data

by: Ritika Sen (May 22, 2012) 
(Computers and Technology/Software)

Simple Steps to Secure Your Computer

by: Russell Card (January 11, 2007) 
(Computers and Technology)

3 Simple Steps on How to Clean Up Your Computer

by: Logan Albright (July 16, 2008) 
(Computers and Technology/Personal Tech)

More Fast Food Restaurants are using Security Camera Systems to Protect their ..

by: Steve Strong (February 26, 2008) 
(Internet and Businesses Online/Security)