Some of the positives that can result from putting these computer protection security guidelines into practice include
As a company desires to grow from a small to a medium sized business it becomes increasingly apparent that leadership must protect corporate resources, corporate information, and the information of customers, associates, and employees, placed in their custody.
Equipment and information in any form is considered an asset of the company and thus must be properly used and adequately protected. This includes usage of personal computers.
Leadership must ensure that the business is controlled, information is adequately protected, and laws are not being violated... AND... Personal Computers play a very large role in the overall equation.
The responsibility for the security of PCs lies with leadership and PC users. The required degree of PC security depends upon the vulnerability to equipment theft, and the sensitivity of information contained on hard drives and removable media.
Employee Handbook Kit includes two Employee Handbook templates for Professional & Manufacturing. Includes over 60 policies and benefits templates.
User ID and authentication access controls becomes the first line of defense to protect against unauthorized access in a computing, communication, or application environment. As a requirement, all users validate their right to access the computing resource.
The validation process is the use of an identification code (userid) and a password or another unique aspect of an individual's physical characteristics. Access controls should prevent unauthorized access to company information through technical, i.e., operating system, and / or procedural, i.e., rules methods. Current industry standards support identification codes and passwords, although other technologies, such as smart cards or biometric keys (face id, fingerprints, retinal prints), can be used to manage highly sensitive information.
Computer protection security involves keeping passwords confidential and only known by you. It must never be shared, publicized in any way, stored on a programmable function key, or kept in a manner where an unauthorized person could gain access.
Password controls should include the following:
a) Users select and keep passwords confidential. Any passwords assigned by a security administrator should be at the time of initial assignment only. Remove any initial passwords that remain unchanged for five (5) days after assignment to prevent usage.
b) Keep passwords masked, never display them in clear text on any company computing resource device.
c) Store passwords in encrypted form, and where technically possible, transmitted using encryption.
d) Do not allow password file access. Passwords can only be reset, not viewed.
e) Change ppasswords at an interval not to exceed 30 days.
f) Password length must be a minimum of eight (8) characters or the maximum length supported by the application or system if less than (8) characters.
g) Password configurations should be alpha, numeric combinations, and special characters where possible.
h) Password controls must be in place to prohibit password reuse by use of a password history log or minimal time between password changes, where possible.
TrainingKeeper Software. Keep, organize and plan all your employees' training and activities. Software includes multi-user support with reports, certs, and calendars.
Other computer protection security password-related controls include
a) Display
ownership statement prior to the access of company information by indicating
the level of accessed company classified information.
b) Invoke automatic time-out and user re-authentication after a specific period of no terminal activity. Set the period of time-out consistent with the sensitivity of company information. Normally, this period should not exceed thirty minutes.
c) Log unsuccessful information access attempts showing access source location. Provide the log to the company information owner to identify and address unauthorized access attempt activity.
d) Suspend userid access after a maximum of six (6) failed sign-on attempts.
e) Disable userids, if not used for a period of ninety days.
f) Prevent hardware/software features that bypass any company computing resource security sign-on procedures, e.g., no automated sign-on, icon-select sign-ons, userids and passwords run through an executable file. This requirement does not preclude the use of products and/or services that provide "single image sign-on" capabilities when approved by information technology management.
g) Controlled access to company information, applications, systems, and infrastructure must have the ability to protect to the file level, including creation, deletion, read, and write. Clearly define the access with segregation of duties, where appropriate.
h) Require that company computing resources, e.g., workstation, server that are connected to a company computing network resource must have access controls in place. These access controls should be consistent with the risks of unauthorized disclosure or compromise of company information.
i) Require
additional controls for remote access, including:
8D Manager Software with 8D, 9D, 5Y and 4M report generator. Your corrective action software for managing, measuring, and reporting issues.
Comprehensive ISO 9001:2015 Audit Checklist for Internal, Gap and Certification Audits.
Your on-line Lean Six Sigma Certification. Course includes videos, reference materials, mobile app, quizzes and a certification test. Start studying today and get certified at your own pace.
Quality Assurance Solutions Robert Broughton (805) 419-3344 USA |
Software, Videos, Manuals, On-Line Certifications | ||
An Organizational Task Management System. Projects, Meetings, Audits & more | ||
Corrective Action Software | ||
Plan and Track Training | ||
AQL Inspection Software |
450+ Editable Slides with support links | ||
Learn and Train TRIZ | ||
Editable Template | ||
Templates, Guides, QA Manual, Audit Checklists | ||
EMS Manual, Procedures, Forms, Examples, Audits, Videos | ||
On-Line Accredited Certifications Six Sigma, Risk Management, SCRUM | ||
Software, Videos, Manuals, On-Line Certifications |