Tuesday, March 16, 2010

good article on security for small business

http://www.computerworld.com/s/article/9161298/Enterprise_security_tips_on_a_small_business_budget?taxonomyId=145&pageNumber=3


theres so many links in this article to check out. read the site also...

quote:
For those of us without the luxury of their own domain, or who are worried that someone might be able to easily guess their myspace@alicejones.net addressing scheme, a few e-mail masquerading services are available. My favorite is Sneakemail.com, which lets you create an unlimited number of e-mail aliases for a modest $2 per month. This way, you can use one unique e-mail per Web site, and all the messages get forwarded to your "real" mailbox. The service even handles replies, so that the Web site never has your real address
running patches for all browsers, adobe, os etc etc.
im concerned cause im running old IE6 for testing purposes...

need to get some virus checking software etc... look into costs etc.

quote - this is didnt know:

The risk of malicious software from P2P (peer to peer) networks far outweighs any legitimate need for BitTorrent or KaZaa. On your personal computer, I still don't advise its use, but I can understand that there are several legitimate reasons for using it. Use reputable Web sites to obtain shareware applications.

If you must participate in P2P, use a separate, nonadministrator user account for those functions. Never run software that you download from a P2P network in your administrator account, and always scan these downloads with several antivirus packages. Virustotal.com is a good place to do a quick scan of a dubious download if you don't already have a solid security package such as Norton Internet Security 2010. If you're a tech-savvy power user, run P2P software in a virtual machine to insulate your host operating system.

virtual machines insulate host machines?? did not know this... i wonder if i could set up clean virtual machines say every month, never use the actual host machine for ANYTHING, never connect it to the net, etc, and just make new virtuals often enough. so if one is compromised then it gets deleted soon enough anyway.