Blog

Important IT Security Policies to Ensure Your Company Has In Place

Even outside of the remote environment and times we’re in security is always vital to an IT infrastructure in terms of ensuring it’s up to date & maintained appropriately. While we’ve certainly seen a spike in security concerns amidst this whole work-from-home culture we always suggest reviewing your IT’s security policies and looking for ways to improve. Ultimately the goal is to secure your environment from data, employee access, and so on. All while finding a balance of convenience and having your user base understand the importance of said policies.

Here are some of our top recommendations to look to put in place across your organization’s IT stack.

2FA or Multi-Factor Authentication

Enforcing a security measure known as 2FA (2-factor authentication, multi-factor, 2-step verification) does as the name implies. It adds a 2nd hurdle when logging into specific apps under certain circumstances. A common use case would be when an employee signs in to your G-Suite inbox for example from a personal laptop or a location they don’t commonly sign in from (let’s say while on vacation) the app will prompt for a code that’s generated via an app or texted to their cell phones. This randomly generated code serves as a 2nd password of sorts to verify you are who you claim to be.

Many apps nowadays allow for this feature to be enabled and in some cases enforced. Such as:

To name but a few, this tremendously helps with preventing unwarranted access to an account. As if the intruder gets access to your password they’d still need the 2FA method to verify access. Making it one of the most secure methods to help lock down accounts. We suggest setting up some sort of enforcement policy for major apps such as G-Suite in order to get everyone enrolled. Many apps offer multiple ways to store said 2FA keys making it easier than ever for end-users to manage.

Password Policies

You’d be surprised the number of passwords left as something simple for convenience sake, written on post-it notes at a user’s desk, and so on. Given these are the first barrier of entry to accounts & even company hardware it’s important to have security policies in place to protect passwords across the organization.

Here are a few of our tips:

Meaning users need to ensure the password they use is up to par or that apps enforce said requirements. Certain character length, complexity (Letters & symbols), and so on.

Proper Network Configuration + Security Settings

We’ve often seen this with networks that were set up without IT’s involvement where certain settings or configurations just lead to potential risks down the road. Given that your network has the potential to provide access to any on-premise devices (servers, network drives, user devices) it’s important to ensure your team has properly configured your setup to have security in mind.

We suggest checking the following:

Device Management System

A big one some companies may not consider especially early on as they build out their fleet of devices (be it mobile or desktops/laptops) is how they manage all of it. What do you do when an employee who has sensitive data on their machine has their device stolen or lost? This is where we recommend a mixture of systems to best prepare & manage these future issues

Another big part of what we help set up & manage for our clients is a tool known as an MDM. This allows us to help manage mobile devices be it iPads, Android phones, or even Macs & PC’s. This lets us set up tools to provision them out the box but most importantly do a couple of things from a security standpoint.

All in all MDM’s are great tools that serve multiple purposes but one of the biggest hands down is improving security & inventory management needs for companies.

These are but a few of the tips & policies we’ve helped implement in our client’s workflow & stack of tools. However there all vital nonetheless to ensuring your team & their data are safe. Security while sometimes coming at a cost or inconvenience for an end-user is for the greater good. As your company begins to scale, prep for compliance, and so on it should always be something you’re ensuring you update to date & following the best practices.

If there’s anything mentioned in the article your team/company wants help implementing in your environment, don’t hesitate to reach out to hello@networkright.com for more info!

Let's get started

Ready for streamlined IT solutions tailored by Network Right? Let’s begin this journey together.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.