ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Security software including Anti-virus and firewalls and security best practices for small business

Updated on June 14, 2012

Due to their reputation for being far less likely to have security software such as anti-virus software and firewalls installed, as well as running out of date security and operating system patches small businesses are often a favoured target of cyber criminals. Additionally, small businesses often do not have dedicated IT resources available to ensure that good security practices are implemented and adhered to.

Small businesses can protect themselves from these outside threats by installing, configuring and regularly updating security software as outlined below as well as regularly patching the company’s computers. In addition, an acceptable usage policy based around some general security best practices should be created, implemented and signed by all employees.

Firewalls

A firewall for a small business is a solution (typically software) that protects the company from any internet traffic that could potentially be harmful to the business.

  • Firewalls scan all internet activity to and from the company and if the activity is determined to be harmful or potentially harmful based on the firewalls predefined security rules then it will be blocked.
  • Some applications utilise specific ports to communicate other than the normal internet and secure internet ports (http:// and https:// traffic on ports 80 and 443). These applications will typically be blocked by a firewall setup using a default configuration, requiring the specific ports used by the application to be opened or enabled.
  • Email communication using SMTP and POP3 will typically require the requisite ports to be opened; similarly FTP will also require a port to be opened to function correctly.

Anti-virus software

Anti-virus software scans all active files for known viruses using its installed virus definition files, protecting the computer from viruses that have infected active files. In addition, the software can scan all files on the computer to ensure that there are no further infected files.

  • Anti-virus software must be installed on all computers and servers in the business and manually configured to scan all files at least once a week.
  • Anti-virus scans can be very CPU intensive, so it is best practice to ensure that scans run when the computer is not in use (typically during the night if the computer is left on).
  • If there are too many files on a server or a computer for the anti-virus scan to complete before the business day begins, then the software should be configured to scan a section of the data (for example one server volume) each day to ensure that all data is regularly scanned.

Corporate anti-virus software will often come as a suite containing antispyware, firewall, and network intrusion prevention software.

  • Antispyware software scans for threats such as malware and other forms of spyware designed to infiltrate or even damager your computers or your network.
  • Network intrusion software monitors your network for suspicious activity or unauthorized access attempts and prevents your network from being broached.

It is crucial that Anti-virus software be configured to update automatically, to allow the software to download up to date virus definition files to ensure that the software is able to detect all currently known viruses.

Providers of corporate anti-virus software are also beginning to offer their software suites using Software as a Service (SaaS).

  • Software installs using an online deployment (installation links can be distributed via email, eliminating the necessity of localized software installation and configuration by CD).
  • Management of the software is centralised to an online console, allowing for reporting, running virus scans and managing security updates to be completed via the internet.


Security Patches

Without an effective patching solution, businesses expose themselves and their data to anyone able to exploit the security weaknesses exposed by out of date or missing security patches.

  • Many bug fixes and operating system enhancements are included alongside security patches which will provide a more stable and productive environment.
  • Patching should also include any applications installed on computers to ensure that they are also running optimally.
  • The simplest and, for many small business, the most effective way of ensuring that all computers are patched is to enable the operating system and any applications configurable to do so to auto-update.
  • Computers should be configured to install the patches automatically on a defined schedule preferably when the computers are not being actively used.
  • Windows will restart the computer automatically (if required) after the installation of updates is complete. This behaviour can be modified using Group Policy if the computers are members of a domain. All users should ensure that their work is saved when they leave work for the evening.
  • Larger firms can use free software solutions such as WSUS (Windows Server Update Services) to automatically deploy patches to their environment.

General security best practice and the creation of an acceptable usage policy

In addition to installing and constantly keeping updated a suite of security software as outlined above, there are a number of additional steps that a small business can take to ensure that the business remains secure and does not inadvertently open itself up to cyber criminals. These security practices include:

  • All PCs should require unique usernames with passwords to logon
  • Staff should be trained to treat emails with attachments from unknown senders with care. If there is any doubt, delete the email without opening the attachment
  • Laptops and mobile devices such as iPhones, CDs, DVDs and USB keys that contain any company data should be encrypted
  • Passwords should be kept private
  • Passwords should never be written down
  • Passwords should be regularly changed (every 90 days is a good practice)
  • PCs should be locked when users leave their desks for any extended length of time
  • Areas containing servers should be physically secure
  • Access codes to restricted areas should be regularly changed
  • When an employee leaves the company, the account should be disabled and the password changed immediately
  • Employees should be continually trained and empowered to follow good security practices to further reduce any risks both to company infrastructure and company data.

These security practices as well as recommendations on how to handle sensitive information should be combined into an acceptable use policy.

  • This policy should outline the security practices above and should also outline the acceptable use of the company’s IT equipment. The policy should include guidelines on acceptable internet usage, application usage and the installation of software.
  • It should also outline the punishment for a violation of the policy which should be signed by each employee.
  • Someone should be assigned to be the “security expert” unless you have an IT presence. It will be their role to ensure that the policy is adhered to and that the software updates are occurring as scheduled.

Conclusion

With anti-virus software and a firewall solution correctly installed, properly configured and fully patched, as well as regularly scanned computers and an acceptable usage policy in place, small businesses can ensure that they are as secure as their larger counterparts.

Alongside a comprehensive IT security policy, a backup and disaster strategy should be implemented to ensure a company can continue to function in the event of data loss or catastrophe. Setting up such strategies is covered in my hub

http://robbiecwilson.hubpages.com/hub/Backup-solutions-and-disaster-recovery-strategies-for-small-business

Well, I hope you have enjoyed reading this hub as much as I have enjoyed writing it. Please feel free to leave any comments you may have below.

Comments

    0 of 8192 characters used
    Post Comment

    No comments yet.

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://hubpages.com/privacy-policy#gdpr

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)