Book description
Invaluable advice on information security in clear, accessible language!
Are you making it too easy for online fraudsters to steal from your company?
IT is opening up new opportunities for your business. It also offers rich pickings for the criminal.
The new threat
When legitimate business goes digital, organised crime cannot be far behind. So, once your business is connected to the Internet, you become vulnerable to a whole range of new threats. Hackers can break into your computer, using dictionary attacks or keystroke logging to seize the password to your email account. ; Criminals may send you emails in an attempt to trick you into downloading malicious software or to reveal your bank details. Online fraud may now be as valuable to organised crime as drug trafficking, and there are roughly 200,000 viruses, Trojans and worms circulating in cyberspace. All this means that in today's world, the bad guys are only a mouse-click away.
What you can do
Your business information is valuable, so it is in your interest to protect it. You also have a responsibility towards your customers. While information security breaches are costly in themselves, you also have to think about what exposing your customers to the danger of identity theft might do to your company's reputation. Sometimes these issues seem complex and bewildering. The good news is that you can take some simple steps that will help to secure your business's digital information. Common-sense precautions, like not leaving your laptop lying around in a public place, or protecting your wireless network with a firewall, make a real difference.
Speaking your language
If IT is not your speciality, and you are running a small business that is connected to the Internet, then this book is for you. The author steers clear of geek language, and offers you, in plain English, ten simple rules to keep you out of trouble online. The damage and losses that result from online fraud can run into thousands of pounds, so this could well be the most valuable books you ever buy!
Benefits to business include:
Retain customer confidence
If you cannot protect your customer data, then you will leave it exposed to hackers and thieves. Breaches in your information security will not only alienate existing customers, but also scare other potential customers away. To protect the reputation of your company, you need to get up to speed on information security.
Avoid fines and lawsuits
If you are running a business, you have a basic duty of care towards your customers. So if you adopt a lax approach towards protecting confidential information such as their bank details, then you can be accused of negligence. This means you could find yourself facing legal action from customers who have been made the victims of fraud. You may also be liable to a £5000 fine for failure to comply with the Data Protection Act.
Protect your profits
When you are running a business, the money that the cybercriminal is trying to steal from you is money you cannot afford to lose. Let this guide show you what to do to stay one step ahead of the criminal, and then you can protect your profits.
Get a grip on the problem
Your business uses IT, but your business is not all about IT. That is why this book is written for business people rather than for IT specialists, in language that you will find easy to follow.
Get secure today - buy your copy of this essential guide for the smaller business right now!
Table of contents
- INTRODUCTION (1/2)
- INTRODUCTION (2/2)
- CHAPTER 1: RULE 1 – SAFEGUARD YOUR COMPUTER
- CHAPTER 2: RULE 2 – USE STRONG PASSWORDS AND A SCREENSAVER
- CHAPTER 3: RULE 3 – UPDATE AND PATCH YOUR OPERATING SYSTEM
- CHAPTER 4: RULE 4 – HAVE AN UP-TO-DATE FIREWALL
- CHAPTER 5: RULE 5 – HAVE UP-TO-DATE ANTI-MALWARE SOFTWARE (1/2)
- CHAPTER 5: RULE 5 – HAVE UP-TO-DATE ANTI-MALWARE SOFTWARE (2/2)
- CHAPTER 6: RULE 6 – ACT ANTI-SPAM
- CHAPTER 7: RULE 7 – SECURE WIRELESS NETWORKS (1/2)
- CHAPTER 7: RULE 7 – SECURE WIRELESS NETWORKS (2/2)
- CHAPTER 8: RULE 8 – BE SENSIBLE – DON’T TAKE UNNECESSARY RISKS (1/3)
- CHAPTER 8: RULE 8 – BE SENSIBLE – DON’T TAKE UNNECESSARY RISKS (2/3)
- CHAPTER 8: RULE 8 – BE SENSIBLE – DON’T TAKE UNNECESSARY RISKS (3/3)
- CHAPTER 9: RULE 9 – BACK IT UP
- CHAPTER 10: RULE 10 – FIX PROBLEMS AS SOON AS THEY ARISE
- GLOSSARY (1/4)
- GLOSSARY (2/4)
- GLOSSARY (3/4)
- GLOSSARY (4/4)
- FURTHER READING
- USEFUL WEBSITES
- ITG RESOURCES
Product information
- Title: Ten Rules of Information Security for the Smaller Business
- Author(s):
- Release date: July 2008
- Publisher(s): IT Governance Publishing
- ISBN: 9781905356553
You might also like
book
Snort Cookbook
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical …
book
Information Security Handbook
Implement information security effectively as per your organization's needs. About This Book Learn to build your …
book
The Cybersecurity Playbook
The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical …
book
Infosec Strategies and Best Practices
Advance your career as an information security professional by turning theory into robust solutions to secure …