Skip to main content

Five Ways to Improve Network Security

A company's computer network is critical to its success. The proper administration and maintenance of a computer network can be expensive, but it can be made even more expensive when security is lapsed. Good network security starts with good internal policies on network usage. Once you get your users to start exercising good network habits, then you can dramatically improve your network security.

1) Email Attachments

One of the worst things you can allow your users to do is open conspicuous email attachments. You need a strict policy that forbids your users to open any email attachments that are from email accounts they do not recognize. The time it takes to get a technician over to a cubicle to properly dispose of a suspicious email is nothing compared to the time it would take to recover an entire network after a virus attack.

2) Email Account Usage

Network safety can be compromised without you even knowing it if you allow your users to sign up for newsletters and other online programs with their corporate email addresses. Once you allow users to sign up for online features with their corporate email addresses, your network will be overrun with spam that can choke your network to a halt. Develop a policy that requires a technician to be present if a user signs up for online features with his email address.

3) Downloading Files

As network technicians, you know the dangers of downloading any kind of file to a computer from a website. In many cases, your users are completely unaware of these dangers. Many users do not see a problem with downloading a desktop theme to their computer because it helps them create a more personal work environment. Your company needs to develop a strict policy banning any file downloading from any Internet site unless the download is approved by a technician.

4) Uploading Files

Network users sometimes bring in CDs from home that have files on them that the users would like to have on their computers. This not only can create a security breach, but it can also disrupt the corporate applications your company currently uses. Your company should ban users from uploading any files to their computer from any removable media unless that media has been checked by a technician first.

5) Chat

Banning users from chat functions can be tricky because some functions, such as Skype, are very popular with corporate users. Your company needs to develop an approved list of chat functions that can be downloaded to company computers and those downloads should only be done by a network technician.

Network security is critical to maintaining an efficient computer network. Once you have the right network usage policies in place, you will be better equipped to protect your network.


About the Author:

This guest post is contributed by Debra Johnson, blogger and editor of live out nanny. She welcomes your comments at her email Id: - jdebra84 @ gmail.com.

Guest Article by Debra Johnson

this is a guest article about five ways to improve the network security written by Debra Johnson. To know more about guest post guidelines to write for this blog please follow the link below.

Write Guest Posts for us

Comments

Popular posts from this blog

iPhone sales help fuel worldwide smartphone numbers

There are nearly 150 million smartphones out there in the world, according to new figures. Thanks to record breaking sales figures by Apple for the iPhone 4S by the end of 2011 there was almost a 50% increase in the number of devices up on the previous year. The research by Gartner Inc. claims the figures rose during the final quarter of 2011 thanks to the 30 million plus iPhone 4S' sold by Apple. The results led to Apple becoming the third largest vendor of mobile phones in the world. They also became the top smartphone vendor, with nearly a quarter of global sales in the fourth quarter. Over the rest of 2011, Apple took a fifth of the share of the smartphone market. The UK and wider Western Europe along with North America were the driving forces for the figures, says Gartner. Up until the launch of the iPhone 4S sales were a little slow. Suddenly the spiked as we all ran out to buy the new device. Worldwide, mobile device sales figures reached 476.5 million in the fourth q...

3 Things to Avoid as a Motivational Speaker

Motivational speakers deliver at least hour-long speeches about positive thinking and how to better yourself and the people around you. These messages often apply to a wide variety of settings, whether at home, at work, or even at a personal level. If you're ever planning on becoming a motivational speaker, there are a lot of things that you should avoid. Here are the three of the most common ones.

Yahoo invisible detector – insights on a new online service

This is a guest article by Iulian about leading Yahoo Invisible detector service http://www.detectinvisible.com/ . There are several online businesses which are basically ruling the online industry, and one of them is Yahoo. Founded in 1994 by Jerry Yang and David Filo in Santa Clara, California, Yahoo! started to grow significantly over the years, now having millions of users all over the world. One of the most widespread products of Yahoo is Yahoo Mail and Messenger. Over time yahoo messenger had become a habit for millions and soon they’ve introduced the possibility to become invisible for other users. It was obvious that a whole new kind of service appeared online, that of yahoo invisible detector. The yahoo invisible detector as an online service first appeared when yahoo was at protocol 13, now being at protocol 17, and at first there were several websites offering their services in order for you to find out which buddy of yours is hiding. Unfortunately, as soon as yahoo star...

The Concepts of Social Networking in Today's World

In today’s high tech world, networking occurs as much on computers as in “real life” social situations. Social media has opened up a vast new frontier for people to connect with others. Before the advent of social media, people generally networked at social gatherings like mixers, fundraising galas and similar events. Of course, such “face-to-face” networking is still important and common, but social media allows possibilities that did not exist before. One of the problems with older networking models is that often the same people showed up at all the events. The percentage of the population that is active in community events tends to be rather low. On the other hand, almost everyone these days uses social media. Vast reach of social networking According to the latest stats, Facebook alone has more than 900 million active users worldwide with the number continuing to grow. Twitter and Google+ also have large numbers of active users that cross all demographic categories. ...

Archive

Show more