search.noResults

search.searching

dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
■ Authentication


3 Control access to sensitive information by requiring employees to use “strong” passwords that contain a mix of letters, numbers and characters. Consider using multi-factor authentication, such as requiring the use of a password and a code sent by different methods.


3 Use password-activated screen savers to lock employee computers after a period of inactivity. Lock out users who don’t enter the correct password within a designated number of attempts.


3 When installing new software, immediately change vendor-supplied default passwords to a more secure strong password.


■ Laptop Security


3 Restrict the use of laptops to those employees who need them to perform their jobs and require them to store in a secure place.


3 Assess whether sensitive information really needs to be stored on a laptop. If not, delete it using a “wiping” program that overwrites data on the laptop.


3 If a laptop contains sensitive data, encrypt and configure it so users can’t download any software or change the security settings without approval from your IT specialists.


■ Firewalls 3 Use a firewall to protect your computer from hacker attacks while it is connected to a network.


3 Determine whether you should install a “border” firewall where your network connects to the internet. Set “access controls” that only allow trusted devices with a legitimate business need to access the network.


3 If some computers on your network store sensitive information while others do not, consider using additional firewalls to protect the computers with sensitive information.


■ Wireless and Remote Access


3 If you use wireless devices like smartphones, tablets or inventory scanners to connect to your computer network or to transmit sensitive information, consider limiting who can use a wireless connection to access your computer network. Encrypt the information you send over your wireless network, so that nearby attackers can’t eavesdrop on these communications.


■ Digital Copiers


Your information security plan should also cover the digital copiers your company uses because the hard drive in a digital copier stores data about the documents it copies, prints, scans, faxes or emails.


3 When you’re buying or leasing a copier, consider the data security features offered, either as stan- dard equipment or as optional add-on kits.


3 Once you choose a copier, take advantage of all its security features. Make it an office practice to securely overwrite the entire hard drive at least once a month.


3 When you return or dispose of a copier, find out whether you can have the hard drive removed and destroyed, or overwrite the data on the hard drive.


■ Detecting Breaches 3 To detect network breaches when they occur, consider using an intrusion detection system.


3 Maintain central log files of security-related information to monitor activity on your network so that you can spot and respond to attacks.


3 Monitor incoming traffic for signs that someone is trying to hack in. Keep an eye out for activity from new users, multiple log-in attempts from unknown users or computers, and higher-than-aver- age traffic at unusual times of the day.


3 Monitor outgoing traffic for signs of a data breach. Watch for unexpectedly large amounts of data being transmitted from your system to an unknown user.


3 Have in place and implement a breach response plan. 26 | The Retailer Magazine | Mar/Apr


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36