What software and anti-viruses are there for protecting confidential files on my computers?
As our technology improves, so do the threats of cyber-crime and hackers. Network security is vital for all business IT systems to protect files, confidential reports and other documents such as staff records.However as the adage goes: 'prevention is better than cure'. A Group Policy can help control variables such as individual user's ability to install unwanted applications or to save files to inappropriate locations and to better control individual user's access level to computers and your network.
To maintain a safe, secure network, companies need to stay one step ahead of the curve with preemptive anti-virus, anti-spyware, and content filtering technology. Computer viruses, aka 'malicious code', are programs written with intent to do harm or to collect information about a computer user without consent.This malicious code can perform a number of harmful acts, depending on the particular virus. Some viruses just delete documents and files, while more harmful viruses or Trojan horse applications can attempt to use your computer to attack another computer or website.
Computer viruses are everywhere, and everyone should protect themselves from the risk of data loss. Luckily, there are several options to protect your computer against viruses.
Running effective anti-virus software is step one. Incorporates a suite of anti-virus products defend your desktops and file servers, identifying and capturing the latest exploits, viruses, worms and Trojans before they damage your systems and vital corporate data. Anti-viruses from major vendors like ESET, McAfee or Symantec can be bought directly from their websites and get to work immediately.
David Robert, CEO, A Great Place to Work based in the UAE, said the company server is protected with anti-spam and anti-virus software on its email system.The anti-virus software should be kept updated as new viruses come out all the time; anti-virus software can only protect you if the software has been updated as well. If a new virus is not in the update library, your anti-virus software will have no impact. After registering new software you will be sent reminders to frequently update it - and you shouldn't ignore these.
To keep your systems safe, don't open suspicious files sent by unknown senders. Whatever e-mail program you use, don't open any attached files, even from people you know, unless you were explicitly expecting that particular file. Email content filtering is your first line of defense against spam and viruses. Spam alone has become the number one burden on corporate resources, wasting precious bandwidth, and employee's time.
In the workplace it's common practice to use a secure administrator password on Windows XP. It already has a built-in administrator account and is able to access all the files and settings on your computer. Many individuals choose no password or a password like 'password'. Your IT department or administrator should be the only one to set and know the password to fully protect company servers.
Computers should have regular clean-ups of unwanted files that can accumulate with downloads. Use Windows Update or the Software Updater for Macintosh OS X to make sure your computer always has the latest fixes and patches for security holes.
More and more businesses are faced with staff surfing websites that not only conflict with company policy, but sites that have been flagged as potentially hazardous for computers. Having the ability to block sites is an invaluable tool for most businesses and this control also allows businesses to maximize productivity, and bandwidth.
"A group policy is likely less effective than addressing this issue at the IT level by having the IT team control who can access the email system, what types of files are allowed, etc.," said Robert.
Another method to protect your computers is to install a firewall. A firewall is essentially the door to your network. By installing a firewall you have complete control over who holds the keys to that door. It lets you only let in the internet traffic you want, while blocking the traffic you want to keep out.
Viruses and other threats can come over networks other than by e-mail. Many malicious programs 'probe' your computer looking for known security holes or open services. A port scan of your system can take seconds and can find innumerable vulnerabilities.
Finally, hard drive failure can be caused by several incidents, such as power surges, physical damage, natural disasters and overwriting. If your hard drive fails and you do not have a backup of the data on it, installing a hard drive recovery system will be your best chance of getting it back.
© Zawya BusinessPulse 2013




















