Keeping your business data secure from unauthorised access.
All organisations are at threat from viruses and unauthorised access. ICG can help you protect your data.
We can recommend and source effective virus detection and protection software to safeguard not only your own network, but the systems of your customers to whom you may pass on the infection through software or e-mail.
We can check your network for all possible paths of infection and show you how to close off these paths or minimise the risk.
We are able to update your virus protection to take account of new viruses by remote link over our secure line.
To keep your network secure from unauthorised access, we can implement methods of protection including passwords and firewalls.
We can help you to draw up enforceable codes of conduct for your users to minimise the risk to your business and to your data of intruders, hackers and virus attack.
Security is of prime importance if you wish to use extranet technology in your own business. The security you provide must be rigid and hacker-proof.
At the same time, this security needs to be flexible enough that different people have access to different parts of your intranet, and you can determine and alter the level of access at will.
You should think about encryption, authentication and firewalls and you should be aware of the possibility of unauthorised access.
A firewall is a program which protects your intranet from unauthorised access. It examines each request to access the intranet and determines whether or not to allow it through.
You will normally set up your portal into your intranet on a specific computer which is isolated from the rest of the system by a firewall, ensuring that only those who have the proper authentication are allowed in.
Encryption and authentication
The internet is an "open" system. Anybody can intercept any packet of data passed across the system. If they can read the information, they can make use of it.
You expect encryption when you give your credit card details over the internet. You should protect your business data the same way, ensuring only the intended recipient can read it.
A hacker or competitor who intercepts an unencrypted message from your business will know that you have not protected your intranet and will consider you an easy target for unauthorised access.
You need to determine the authenticity of both the sender of a message, and the data you receive. You need to know that anybody entering your intranet has permission to do so.
There are four basic types of authentication passwords, tokens, digital certificates and biometrics. ICG can advise you on the best type to use for your business.
For further information, please call ICG on 0870 871 2602 or email email@example.com.