Enterprising I.T. Solutions

 

Information

 

Home Office Security Risks

 
          Home
 

 

    
 

Home office computer users, are lulled into a sense of security by working out of their own home.  Since they are not a "Known" business, they feel they are not a target of security threats.  

Unfortunately nothing could be further from the truth.  Hackers & Crackers are exploiting the generally lax security on home computers and home offices to gain access to data, bank accounts #, PINs, and even individuals identities.  Sometimes the target of these intruders is not your system, rather they takeover your system in an effort to team it up with hundreds or thousands of others to attach some larger, more valuable target.

With your business data, clients lists, strategic information, and often the very life blood of your business at risks, as well as your children's general welfare, innocence, and possibly life at risk, security risks of the home office computer users can not be left un addressed.

Taking Proactive measures to identify and reduce or eliminate the risks you have in a home office computer environment, is smart business.

 

Typical Technical issues and risks addressed for Home Offices

 
  • Virus Protection - Are your computers currently infected with a virus? Are your virus definition up to date?, Data loss, Systems crashes, program corruption, and lost productivity are common risks associated with Viruses, Trojan horses and worms.
  • Data Protection / Backups - Over 60% of small businesses fail within 1 year after suffering a substantial data loss, most environment are not properly protected with reliable, well tuned Data protection that meets their legal obligation for retention of data.
  • Access to the Internet - Unmonitored, unsecured internet access, especially with 
    "always on" broadband access, increases your risk of hackers gaining access to your system. (See Broadband clients for more details).
  • Intrusion detection - Hackers and other Internet predators may be attempting to exploit the security holes in your current computing solution, leading to theft of your data or identity, introduction of viruses, and damage to your computers.
  • Identity protection - Spyware may be tracking your online activities, purchases, even your credit card #s and PINs, waiting to send it back out of your system to someone else on the Internet.
  • Local system security - Logging  on to your system as full administrator exposes your computer to increased virus risks, accidental key file and program deletion or data loss.  
  • Email - Unfiltered email exposes you to annoying Spam, or undesired "adult-content" emails, and their often associated viruses.
  • WEB site access - Providing employee access to web sites may be necessary for your business, but unrestricted, unmonitored access can expose you and your organization to substantial legal implications, including harassment lawsuits.
  • Other online Services - FTP downloads, Telnet access to your resources from the Internet, Chat software all can expose your local computers systems and files to the internet, as well as increased risk of Viruses, Trojan horses, and worms.