Tactical Advice

3 Tips to Close Your Security Gaps

These tips can provide simple, quick and inexpensive solutions to your security problems.
3 Tips to Close Your Security Gaps

Businesses need security, but they usually don’t like it. Security, to many businesses, is complicated, time-consuming and expensive. But relax: These three tips can make security simple, quick and inexpensive.

Secure Your Mobile Devices

Mobile devices have become hugely popular, and for good reason. They make life and work easier. But they also need better security, as 60 percent of data breaches come from compromised mobile devices.

Here’s a quick security test: How many devices in your possession at this moment have an on-off switch? Quick test No. 2: How many of those devices will give up all your secrets to whomever finds them after you leave them in a taxi? Thousands of notebook computers and phones are left in taxis each week, and thousands more are left at airport screening stations.

All notebooks need full-disk encryption. But don't waste time trying to encrypt some folders and not others, and don’t put all your trust in Windows encryption. Get full-disk encryption software for every notebook at your company. Even those that stay put can be stolen from your office, so protect all of them. Newer notebooks often have encryption-ready hard drives installed, so take advantage of that feature.

Phones and other mobile devices have a security code, but many users ignore it. Smartphones can carry plenty of company secrets, so protect the data areas of your smartphone with third-party tools. This also makes your phone more manageable.

Provide Password Guidelines

Password protection is a necessity now more than ever as companies move to cloud services, but many companies let employees choose their own passwords. Users remember passwords better when they choose them themselves, but make sure to provide some guidelines.

Ask users to follow some simple rules. For instance, avoid any words in the dictionary, including numbers and symbols, and use more than five characters (your rules may vary depending on your policies). Because people remember words, have them substitute numbers for letters, such as zero for "O", one for "I" and three for "E". Then sprinkle in a bang (!), splat (*), or at (@) here and there. And there you have it — better passwords.

Those passwords provide access to company assets, so employees shouldn't consider them private. Keep a list of each employee’s passwords, and update the list when they change. Too often, employees share passwords with each other, and that is certainly not secure. It’s better to have managers share user passwords as needed, then ask the employee to change those passwords after sharing.

If your security policies don’t allow that, discourage users from sharing passwords at all. But if they do, remind them that they better really trust the person they’re sharing with, because misuse of a password could get them fired.

Conduct an Exit Audit

Make sure to clean up after employees leave the company. That means changing the passwords for all their systems, especially those that are accessed remotely. Disgruntled employees can easily sabotage systems that are left open, so slam that door shut. And internal systems will remain vulnerable because, as we just noted, users share passwords, so keep the former employee’s accounts open but change passwords while they are boxing up their personal items.

Not every lost notebook will be taken by a thief, not every password-protected system will be attacked by hackers, and not every former employee will try to wreak havoc after leaving the company. But security awareness means protecting even against the long odds, so prepare yourself. These tips can help close security gaps and better protect your company.

Sign up for our e-newsletter

About the Author

James E. Gaskin

James E. Gaskin

James writes books, articles and jokes about technology from his Dallas-area home office. He also consults for those who don’t read his books and articles.


Heartbleed: What Should Your... |
One of the biggest security vulnerabilities has almost every user and every industry...
Why Businesses Need a Next-G... |
Devices investigate patterns that could indicate malicious activity.
Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....


The New Backup Utility Proce... |
Just getting used to the Windows 8 workflow? Prepare for a change.
How to Perform Traditional W... |
With previous versions going unused, Microsoft radically reimagined the backup utility in...
5 Easy Ways to Build a Bette... |
While large enterprises have the resources of an entire IT department behind them, these...

Infrastructure Optimization

Businesses Must Step Careful... |
Slow and steady wins the race as businesses migrate IT operations to service providers,...
Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Ensure Uptime Is in Your Dat... |
Power and cooling solutions support disaster recovery and create cost savings and...


Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
How to Maximize WAN Bandwidt... |
Understand six common problems that plague wide area networks — and how to address them.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Mobile & Wireless

Mobility: A Foundational Pie... |
Other technologies rely on mobile computing, which has the power to change lives, Lextech...
Now that Office for iPad Is... |
After waiting awhile for Microsoft’s productivity suite to arrive, professionals who use...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.

Hardware & Software

Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....
New Challenges in Software M... |
IT trends such as cloud, virtualization and BYOD pose serious hurdles for software...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.