This document provides recommendations for best practices in network security from various industry sources. It recommends conducting an initial risk assessment and maintaining up-to-date antivirus software, firewalls, and security patches. It also recommends securely disposing of hardware and software, monitoring third parties, restricting personal use on work devices, and using multi-factor authentication. The document provides many additional specific tips to help secure systems and protect sensitive data.
This document provides recommendations for best practices in network security from various industry sources. It recommends conducting an initial risk assessment and maintaining up-to-date antivirus software, firewalls, and security patches. It also recommends securely disposing of hardware and software, monitoring third parties, restricting personal use on work devices, and using multi-factor authentication. The document provides many additional specific tips to help secure systems and protect sensitive data.
This document provides recommendations for best practices in network security from various industry sources. It recommends conducting an initial risk assessment and maintaining up-to-date antivirus software, firewalls, and security patches. It also recommends securely disposing of hardware and software, monitoring third parties, restricting personal use on work devices, and using multi-factor authentication. The document provides many additional specific tips to help secure systems and protect sensitive data.
This document provides recommendations for best practices in network security from various industry sources. It recommends conducting an initial risk assessment and maintaining up-to-date antivirus software, firewalls, and security patches. It also recommends securely disposing of hardware and software, monitoring third parties, restricting personal use on work devices, and using multi-factor authentication. The document provides many additional specific tips to help secure systems and protect sensitive data.
Experts recommend that you conduct an • Conduct ‘test’ phishing attacks on your initial risk assessment of your online and employees. operating systems. These best practices have • Perform and maintain a complete asset been collected from various industry sources. inventory; take steps to securely dispose of Park Bank makes no recommendation as to hardware and software. which best practices are appropriate for your • Monitor third-party vendors and their business. Since every business is unique, Park products to ensure secure remote access Bank strongly recommends that you contact implementations. your IT professional to evaluate your system • Don’t allow company-issued workstations and suggest best practices for your business. to be used as personal computers. Do not allow employees the ability to install any • Install updated anti-virus and anti-spyware personal software or downloads (games, programs and firewall on all computers file sharing, personal email accounts) from annually. Ensure that they are enabled and the Internet. configured for automatic updates. • Prohibit the use of personal USB drives, • Keep all security programs, along with the portable hard drives or other unauthorized operating system and software, up-to-date devices to be connected to company with the most current patches. If operating systems. system is discontinued, patches may no • Use multi-factor authentication wherever longer be available. Upgrade to a newer possible (tokens, PINs, digital certificates, operating system. etc.). • Centrally manage both physical and • Use mobile or email alerts and systems access. Audit system activities, notifications for high-risk activities. such as successful and failed user logins, • Make sure your card processing systems file and system access. All operating and hardware are Payment Card Industry systems, and most applications such as compliant. firewalls, have the ability to audit system • Secure data on mobile phones and activities. portable flash drives with password entry. • Back up files incrementally (daily) and • Prevent users from sharing login fully (weekly). Test restore function to credentials. ensure backups are working as intended. • Require strong passwords, having at least Another option is to use an external hard eight characters. Incorporate upper and drive or website service to back up. Keep lower case letters, numbers and special backups off site. characters. Do not use dictionary words. • Consider encryption of sensitive data. • Educate employees about social • Conduct an external network penetration engineering scams in the office, such test (simulates a targeted attack on your as fake employment interviews, fake systems via the Internet) to identify vendors or phony contract bids or rogue vulnerabilities in your organization’s media such as USB drives found near the systems. entryway or in a public area.
02/2015 Member FDIC
414.466.8000 / www.ParkBankOnline.com
• Be careful what you download, open • Use an authorized, separate administrator
or click on because this action can account for installing or removing circumvent even the most vigilant anti- software. virus software. Be wary of forwarded • Know the warning signs of when you may attachments from people you do not know. have a problem: • Turn off your computer when not in use, • Know your computer. If acting which severs an attacker’s connection to strangely (slow response time, other company resources. excessive pop ups, etc.) check it out. • Use bookmarks in your Web browser • Know when to expect your account for entities with which you regularly statements. Better yet, use online communicate. functionality to review activities daily.
Tips from leading experts: Create a security agreement:
• Use a dedicated PC for conducting online • Have all employees sign a security banking activities. agreement in order to demonstrate that • Restrict remote access users and they are taking cyber security seriously applications. and are active participants in helping to • Never give out your password, account maintain a secure online environment. number, ID, or credentials via email, the Web, text messages, or telephone. Park Bank will never ask for confidential information via email. • Retire “end of life” hardware and software that have no security patches available. • Consider a network firewall with unified threat management capabilities. This will provide another layer of protection from viruses, spam and other targeted attacks on your network.