0% found this document useful (0 votes)
174 views

Data and Network Security Checklist: Technology in Your Corner

The document provides a checklist of questions for businesses to ask about their network security and data protection. It covers topics like basic network security, user access controls, email security, mobile device policies, and data backup and encryption. The checklist aims to help businesses ensure only authorized individuals can access company data and prevent data loss or theft. It also discusses common policies businesses should have like acceptable use, remote access, BYOD, encryption, and privacy policies to properly manage and protect their data and network security.

Uploaded by

Spad Parnian
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
174 views

Data and Network Security Checklist: Technology in Your Corner

The document provides a checklist of questions for businesses to ask about their network security and data protection. It covers topics like basic network security, user access controls, email security, mobile device policies, and data backup and encryption. The checklist aims to help businesses ensure only authorized individuals can access company data and prevent data loss or theft. It also discusses common policies businesses should have like acceptable use, remote access, BYOD, encryption, and privacy policies to properly manage and protect their data and network security.

Uploaded by

Spad Parnian
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Technology In Your Corner

Data and Network Security Checklist


When it comes to your data, you can never be too careful. Data loss or theft has both short-term and long-term
repercussions for your business operations. Taking a proactive approach and securing your network and data
can go a long way to preventing a catastrophic incident.
Do you know everyone who has access to your company data? You’re trusting them with the personal infor-
mation that your clients have entrusted you with. This checklist is comprised of questions you should ask an IT
manager or network administrator whenever and wherever you’re storing data.

Basic Network Security


 Who is in charge of your network security? Do they have IT-related
experience?
About IronEdge
 What is your process to review, test and implement new technology
Founded in July of 2005, IronEdge
solutions?
Group provides businesses in and
around Houston and San Antonio
Documentation
with a multitude of enterprise IT
 Are your IT systems and administrative passwords well documented and solutions. For more than a decade,
up-to-date? IronEdge Group has worked with
 Do multiple trusted people have access and is this access level businesses of all sizes and
documented?
industries to design and deliver
 Is the information secure or locked away?
technology solutions that meet the
needs of their customers and
User Access
exceed their expectations.
 Are there measures in place that controls who is able to access your data? Specializing in assisting
 Is there an administrator who manages access control? organizations streamline daily
 Is there a record of who can access the data and a log to track the user? operations,
 Does your firm offer training on cyber security to its employees?
 Is there anyone outside of your internal staff that will have access to client IronEdge Group focuses on taking
data?
proactive measures to ensure the
security and integrity of their clients
Email technology. Among many other
 Are you using external Spam and Virus Filtering? awards, IronEdge Group has
 Have you confirmed your MX Records, SPF Records and Server Identity recently landed a coveted position
are setup properly? on the CRN's 2016 Managed
 Are you scanning for viruses inside your mail server database? Service Provider 500 list, along with
 Do you have a written policy for transmission of client data? being voted one of the "Best Places
 Are you leveraging encrypted email to communicate outside of your to Work" by the Houston Business
organization? Journal for the third consecutive
year.
Bring Your Own Device (BYOD)
 Do you have a policy or software to manage use of mobile devices?
 Is there a policy in place to remove firm data if an employee owned device
is lost or the employee is terminated? IronEdge Group
3000 Wilcrest Drive, Suite 300
Networking Houston, Texas 77042
 Do you have a hardware firewall and is it under support by the
manufacturer? (713) 574-5555
 Is the firewall configuration clean and operating system up to date? [email protected]
 Do you have a monitored Intrusion Detection System in place?
www.IronEdgeGroup.com
 Are you using a strong encryption on your wireless networks?
Technology In Your Corner

Physical Security
 Are your servers and data in a physically locked or restricted area?
 If so, who has access and how?
 Are laptops loaded with disk encryption and/or tracking software in the event they are lost or stolen?
 Are the doors to your offices secure at night and on the weekends?

Data/Files
 Where are your backups and how do they get where they are going?
 Are your files and folder permissions on your servers secure and setup properly?
 How do you store and transfer sensitive information with your clients?

Websites
 Where is your website hosted?
 Are you using SSL certificates for your website to ensure encrypted communication?

Operating Systems and Applications


 Are you enforcing the use of strong passwords? Are regular password changes enforced?
 Are your computers running supported versions of their operating systems?
 How often are your systems patched and how do you know it is working?
 Do you patch all of your applications or just Microsoft Products?
 Are you running network wide anti-virus and anti-malware software and is it up to date with a valid subscription?

Data Loss/Theft
 What is your data theft plan?
 What is your policy for notifying your clients of a data breach/loss situation?

Common Policies to Protect and Control Data


Acceptable Use Policy
A set of rules and guidelines created by the owner of a network, website, and application to control a users’ actions to
prevent risks associated with the abuse of technology.

Remote Access Policy


A documented outline of acceptable methods of remotely connecting to the internal network.

(Bring Your Own Device) BYOD Policy


Because of the popularity of using personal mobile devices (such as smart phones and tablets) to perform tasks while at
work, businesses should implement a BYOD policy and software solution to control the devices access to their data and
network.

Encryption Policy
Defines which methods of data encryption can be used in an organization, as well as the recommended encryption
method(s). This type of policy is critical when it comes to compliances, to ensure data safety standards are clearly
understood and met by everyone on the network.

Privacy Policy
Details how information collected will be used, disclosed, stored and managed by the company receiving the
information.

Email and Communications Policy


Outlines acceptable behavior and uses of a business’ email along with other business communications. They often
define the acceptable and unacceptable uses for that communication, i.e.: phones, fax machines, VoIP, etc.

HOUSTON SAN ANTONIO


3000 Wilcrest Drive, Suite 300, 888 Isom Road, Suite 101,
Houston, TX 77042 San Antonio, TX 78216
713-574-5555 www.ironedgegroup.com 210-757-4222

You might also like