Nezbytná je registrace. Vícemén? je to P.R. dokument, v odstavci Best Practices je formulováno dvanáct doporu?ení:
- Close security gaps: Laptops travel, and contractors and visitors connect to your network. Protect network endpoints, not just perimeters.
- Integrate defenses: Combine antivirus, firewall, intrusion detection, and vulnerability management at endpoints, and add encryption if they travel.
- Patch software: Threats evolve, so close vulnerabilities quickly by applying updates from Microsoft® and other software providers.
- Update virus definitions: Keep your virus definitions up to date so your antivirus software recognizes new threats.
- Alert employees: Warn them about attachments and links in unexpected email, and in software downloads before they are scanned for viruses.
- Don’t invite trouble: File-sharing services and websites may install malicious code automatically. Stop them with training, policies, and software.
- Strengthen passwords: Require passwords that mix letters and numbers—never names or dictionary words—and change them often.
- Schedule backups: Implement and enforce backup schedules for your servers, desktops, and laptops—and automate as much as you can.
- Back up complete systems, too: A “down” server means lost business, so back up the operating system, applications, configurations, and settings, not just files.
- Keep off-site backups: Make sure files and systems can survive fire, flood, vandalism, sabotage, loss of your facility, or even a regional disaster.
- Test backups: Don’t wait until recovery to discover a resource, process, or technical shortcoming—test the entire cycle.
- Get help: Find a local IT partner whom you trust, who understands and can help with both your business and technical requirements.