Technology Checklist
WiFi:
- Use strong administrative and network access passwords
- Use strong encryption (WPA2 and AES encryption)
- Use separate WiFi for guests
- Physically secure WiFi equipment
- Get savvy about WiFi hotspots:
- Limit accessing sensitive information on public WiFi
- Use VPN when using public WiFi
Virtual Private Network (VPN):
- Use strong passwords, authentication and encryption
- Limit access to those with valid business need
- Provide strong antivirus protection to users
Network Devices:
Routers and Switches- Use a network monitoring app to scan for unwanted users
- Restrict remote administrative management
- Log out after configuring
- Keep firmware updated
- Use strong passwords
- Default rules should block everything that is not specifically necessary for the business
USBs:
- Scan USBs and other external devices for viruses and malware when connected
- Only pre-approved USBs allowed in company devices
- Educate users about USB risks
Mobile Devices:
- Keep a clean machine: Update security software on all devices
- Delete unneeded apps
- Secure devices with passcodes or other strong authentication such as a finger swipe and keep physically safe
- Encrypt sensitive data on all devices
- Make sure “find device” and “remote wipe” are activated
Website:
- Keep software up to date
- Require users to create strong passwords to access
- Prevent direct access to upload files to site
- Use scan tools to test your site’s security – many are free
- Register sites with similar spelling to yours
- Run most current versions of content management systems or require web administrator/hosts to do the same
Email:
- When in doubt, throw it out: Educate employees about remaining alert to suspicious email
- Provide all email recipients with an option to opt off your distribution list
- Require long, strong and unique passwords on work accounts
- Get two steps ahead: Turn on two-factor authentication
Social Networking:
- Create page manager policies and roles
- Limit administrative access
- Require two-factor authentication
- Secure mobile devices
File Sharing:
- Restrict the locations to which work files containing sensitive information can be saved or copied
- If possible, use application-level encryption to protect the information in your files
- Use file-naming conventions that are less likely to disclose the types of information a file contains
- Monitor networks for sensitive information, either directly or by using a third-party service provider
- Free services do not provide the legal protection appropriate for business
Point of Sale (POS):
- Make unique, strong and long passwords and change regularly
- Separate user and administrative accounts
- Keep a clean machine: Update hardware and software as needed
- Avoid web browsing on POS terminals
- Use antivirus protection
Copiers/Printers/Fax Machines:
- Understand that digital copiers/printers/fax machines are computers
- Ensure devices have encryption and overwriting
- Take advantage of all the security features offered
- Secure/wipe the hard drive before disposing of an old device
- Disable the web management interface or change the default password
Cloud and other 3rd Party Vendors:
- Discuss the approach to security and codify in any agreements and contracts
Other:
Secure Disposal- Be aware that many devices, not just PCs and phones, have memory. Know how to clean old data before disposing
- Isolate IoT devices on their own protected networks and change default passwords
- Know what information is being collected and how and where it’s being stored and protected
- Consider whether IoT devices are ideal for their intended purpose
- Purchase IoT devices from manufacturers with a track record of providing secure devices
- When available, update IoT devices with security patches




