Security Guide For Small Business
Security Guide For Small Business
security
today
ty, employee productivity, or einstalled with genuine Microsoft ness forward. Only genuine otect your vital business data.
o-date security features to help plus improved system recovery cluding Windows XP Professional Edition 2003 & Windows Small together for maximum
t your systems performance n for delivering dependable aws is a sound business practice y within the business community.
t, Windows Media, the Ofce logo, Outlook, s or trademarks of Microsoft Corporation in the companies and products mentioned herein may
We would like to know your opinion of this Security Guide and whether you were able to implement any of the security measures recommended. Simply visit www.securityguidesurvey.com, answer a few short questions, and well send you a free copy of the Small Business Tips & Templates Toolkit*. This two-CD toolkit provides a rich set of templates, business articles, how-to videos, and tips to help maximize your productivity. Microsoft Small Business Team
* Offer good in the U.S. only until 12/31/05 while supplies last. Limit one CD per customer. Please allow 6-8 weeks for delivery.
Sincerely,
Donald Wilson President & CEO Association of Small Business Development Centers
Small Business Development Centers The Small Business Development Center (SBDC) network is a partnership program uniting private enterprise, government, higher education, and local nonprot economic development organizations. The SBDC network is the U.S. Small Business Administrations largest economic development program, utilizing federal, state, and private funds to provide management and technical assistance to help Americans start, run, and grow their own businesses. With nearly 1,000 centers across the nation, the SBDC program meets the in-depth counseling and training needs of more than 650,000 small businesses annually in face-to-face counseling and training events. The SBDCs across the country are represented by the Association of Small Business Development Centers (ASBDC). To learn more about the ASBDC, visit www.asbdc-us.org Microsoft Small Business Center Microsoft Small Business Center is an online resource designed specically to address the needs of small businesses by demystifying technology and helping small business owners get the most out of their software. To learn more, visit www.microsoft.com/smallbusiness/
Sincerely,
Contents
1 2 11 14 17 20 20 27 31 33 37 40 44 46 49 52 63 Is This Guide Right for You? What You Need to Know About Security Finding the Right Consultant 10 Questions to Help Protect Your Business Microsoft Windows XP Service Pack 2 Seven Steps to Better Security Step 1: Protect Your Desktops and Laptops Step 2: Keep Your Data Safe Step 3: Use the Internet Safely Step 4: Protect Your Network Step 5: Protect Your Servers Step 6: Secure Line-of-Business Applications Step 7: Manage Computers from a Server Creating a Security Policy Creating a Security Plan Sample Security Plan: Adventure Works Information Online
Regardless of how or why your business is attacked, recovery usually takes signicant time and effort. Imagine if your computer systems were unavailable for a week. Imagine if you lost all the data stored on all the computers in your company. Imagine if your biggest competitor was able to obtain a list of your customers along with sales gures and sales notes. How long would it take before you noticed? What would these breaches cost your company? Could you afford these losses? It seems like common sense. You wouldnt leave your building unlocked at night. The same is true with information security, and a few simple steps can make you a lot less vulnerable. Technology experts have a way of making basic security seem like a huge and difcult issue. Luckily, securing your business is easier than you might think. Of course, there is no way to guarantee 100 percent security. What You Need to Know About Security 2
However, you can achieve a high level of security and be prepared in case breaches happen. Properly weighing risks and consequences against the cost of prevention is a good place to start. This section provides an overview of some common computer networking and security-related terms to help demystify the world of computer security.
Packets
Information typically travels across networks in packets. A packet is a chunk of data plus an address and other information that tells the network where to deliver that data. Everything going over the Internet is broken down into packets: Web pages, e-mail messages, downloads, everything. Think of it like taking a circus on the road. You cant take the whole circus in one vehicle. You have to break it up, package it into separate vehicles, tell each vehicle where its going, and put the circus back together when all the vehicles arrive at their destination. Data traveling over a network works like this, too. Big data is broken down into a series of packets and reassembled at the destination. As packets travel over the Internet, they are effectively exposed to eavesdropping by the public.
particular port, the computer knows which application gets the packet. For example, port 80 is the port for Web servers (which host the websites you use your Web browser to explore), and port 25 is the port that is used to send e-mail. Packets are addressed to a specic port at a specic IP address.
Firewalls
A rewall separates one portion of a network from another and allows only authorized network trafc to pass through. On a small business network, a rewall typically separates the local private network from the Internet. Some rewalls examine the packets that Figure 1. A rewall allows network trafc from ow in and possibly valid users (the green line) to pass through to your network but blocks trafc from intruders out of the network (the red line). to make sure that they are legitimate; rewalls can also lter out suspicious packets. Firewalls hide the identities of computers within your private network to make it harder for criminal hackers to target individual computers (Figure 1).
Servers
A server is really just another computer attached to a network that is designated to perform some special function, such as share a printer, store les, or deliver Web pages. Remember that if your laptop or desktop computer is connected to the Internet, it is also a kind of server and, without a rewall, is capable of receiving unwanted trafc from the Internet. 5 What You Need to Know About Security
Spoong. A couple of kinds of spoong exist. IP spoong means creating packets that look as though they have come from a different IP address. This technique is used primarily in one-way attacks (such as denial of service, or DoS, attacks). If packets appear to come from a computer on the local network, it is possible for them to pass through rewall security (which is designed to protect against outside threats). IP spoong attacks are difcult to detect and require the skill and means to monitor and analyze data packets. E-mail spoong means forging an e-mail message so that the From address does not indicate the true address of the sender. For example, a round of hoax e-mail messages circulated the Internet in late 2003 that were made to look as though they carried a notice of ofcial security updates from Microsoft by employing a fake Microsoft e-mail address. Dozens of industry leaders, including Microsoft, have co-developed a technology called the Sender ID Framework (SIDF) that helps to counter e-mail spoong and phishing by validating that messages come from the mail servers they claim to come from.
Phishing. Phishing is Did You Know? increasingly becoming a tactic of choice for In June 2004, the Gartner Group reported that online bank accounts had hackers and organized been looted of $2.4 billion just in the crime. Typically, an previous 12 months. It estimated that 1.98 attacker sends an e-mail million adults had suffered losses. Much of the problem was traced to malicious message that looks very programs that surreptitiously collect much like it comes from passwords and other condential data. an ofcial source (such as Phishing schemes also were used. eBay or Microsoft). Links in the message take you to a website that also looks like the real thing. However, the site is just a front, and the goal of the scam is to trick you into giving away personal information, sometimes for spam lists, sometimes so that the perpetrators can steal your account information or even your identity. The victims of these scams are not only the users who may divulge personal and condential information, but also the spoofed business brand and reputation. Viruses. Viruses are programs designed to replicate themselves and potentially cause harmful actions. They are often hidden inside innocuous programs. Viruses in e-mail messages often masquerade as games or pictures and use beguiling subjects (for example, My girlfriend nude) to encourage users to open and run them. Viruses try to replicate themselves by infecting other programs on your computer. Worms. Worms are like viruses in that they try to replicate themselves, but they are often able to do so by sending out e-mail messages themselves rather than simply infecting programs on a single computer. Trojan horses. These malicious programs pretend to be benign applications. They dont replicate like viruses and worms but can still cause considerable harm. Often, viruses or worms are smuggled inside a Trojan horse.
Spyware. Spyware refers to small, hidden programs that run on your computer and According to the National Cyber are used for everything from Security Alliance, 62 percent of computer users have not updated tracking your online activities their antivirus software, and a to allowing intruders to staggering 91 percent in the study monitor and access your have spyware on their computers that can cause computer. You might be the extremely slow performance, target of spyware or other excessive pop-up ads, or hijacked unwanted software if you home pages. download music from le-sharing programs, free games from sites you dont trust, or other software from an unknown source.
Did You Know?
Tampering. Tampering consists of altering the contents of packets as they travel over the Internet or altering data on computer disks after a network has been penetrated. For example, an attacker might place a tap on a network line to intercept packets as they leave your establishment. The attacker could eavesdrop or alter the information as it leaves your network. Repudiation. Repudiation refers to a users ability to falsely deny having performed an action that other parties cannot disprove. For example, a user who deleted a le can successfully deny doing so if no mechanism (such as audit records) can prove otherwise. Information disclosure. Information disclosure consists of the exposure of information to individuals who normally would not have access to it. For example, a user on your network might make certain les accessible over the network that should not be shared. Employees also tend to share important information, such as passwords, with people who should not have them. Denial of Service. DoS attacks are computerized assaults launched by an attacker in an attempt to overload or halt a network service, such as a Web server or a le server. For example, an attack may cause a server to become so busy attempting to respond that it ignores legitimate requests for connections.
Elevation of privilege. Elevation of privilege is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system. For example, an attacker might log on to a network by using a guest account, then exploit a weakness in the software that lets the attacker change the guest privileges to administrative privileges. Pirated software. The use of counterfeit software is widespread. In some parts of Asia and the former Soviet Union, at least 90 percent of the software used is counterfeit. Even in the United States, an estimated 25 percent of software is counterfeit. While the low prices of counterfeit software can be attractive, such software comes with a potentially much higher Did You Know? price: Counterfeit software can Earthlink, the Atlanta-based contain bugs and viruses and Internet Service Provider, said is illegal. Genuine Microsoft in April 2004 that it had found 370,000 Trojan horses and system software provides up-to-date monitors on the 1.6 million protection against hackers and computers it had studied. If e-mail viruses, plus improved Earthlinks numbers hold up for all computers, up to 35 percent system recovery tools. You can are compromised. learn more about genuine Microsoft software by visiting www.microsoft.com/genuine/small_business.px?displaylang=en Most attackers use the processing power of computers as their weapon. They might use a virus to spread a DoS program to thousands of computers. They might use a password-guessing program to try every word in the dictionary as a password. Of course, the rst passwords they check are password, letmein, opensesame, and a password that is the same as the username. Attackers have programs that randomly probe every IP address on the Internet looking for unprotected systems and, when they nd one, have port scanners to see whether any ports are open for attack. If these attackers nd an open port, they have a library of known vulnerabilities they can use to try to gain access. For more deliberate attacks, such as industrial
espionage, a combination of technology and social engineering is most effective. For example, inducing members of your staff to reveal condential information, riing through trash in search of revealing information, or simply looking for passwords written on notes by monitors are all options.
The Importance of Software Updates According to the Symantec Internet Security Threat Report published in September 2004, it takes on average 5.8 days after a software vendor announces a vulnerability for criminal hackers to take advantage of the discovery. You should apply software updates as soon as possible when they are announced. You should use the Automatic Updates feature in Microsoft Windows XP to download and install updates automatically and also make sure that your antivirus software is updated regularly. Consider signing up for Microsoft Security Update e-mail bulletins, a free service you can learn more about at www.microsoft.com/security/bulletins/alerts.mspx
10
Experience
Does the consulting group have a Certied Information Systems Security Professional (CISSP) engineer on staff? If they have a CISSP on staff, you should feel good about the consultants level of security expertise. Do they have a CompTIA Security+ Certication? CompTIA Security+ measures industry-standard knowledge and competencies for managing information security.
11
Does the consulting group have a Microsoft Certied System Engineer (MCSE) or Microsoft Certied Systems Administrator (MCSA) on staff? MCSEs are specialized in understanding how to design, implement, and administer security for a Microsoft Windows Server 2003-based network. MCSAs specialize in understanding how to administer network environments. How long has the consulting group been in business and how many customers do they have? Are they willing to provide a list of customers you can talk to about the groups services?
Services
Which of the following security services does the consulting group provide? a) Antivirus installation and support b) Hardening servers (i.e., ensuring that all system settings are at the appropriate level of security) c) Hardening desktop computers d) Firewall installation, conguration, and support e) Intrusion detection Do they provide security audits? On which operating systems? Do they provide 247 remote or on-site security support? What levels of support will they provide? Look for a service level agreement that sets out how quickly they will respond to problems and the level of after-sales support they offer. Can they provide or recommend reputable trainers?
12
Approach
Does the consultant apply consistent patterns and practices in its operations? Ask to see an outline of its process. Can they commit to a specic schedule and budget for a given project? Will they be able to do the work with their own staff, or will they have to subcontract? What is their fee structure? Depending on the project, it is possible to agree on a at fee, an hourly or daily rate, or an ongoing retainer. Are they willing to break down their cost structure and allocate costs to different stages or activities? You want accurate, exact, and precise information before any work is commissioned. How do they approach documentation? They should supply you with a proposal for the work, including a budget, a timetable, and a reasonable specication. The proposal should be in plain English. If their proposal is satisfactory, you should have a written contract specifying what is going to be done and by whom. Make sure to include dates, deadlines, equipment, costs, and so on. Even if you do not have a formal contract drawn up by attorneys, make sure that the details of the work are written down and agreed to in some form.
Where To Go Next
To nd a Microsoft Small Business Partner, use these steps: 1. Visit the Microsoft Small Business Partner Finder website: www.microsoft.com/smallbusiness/partner/vendorsearch.mspx 2. Enter your zip code and desired proximity. 3. Check out those partners who offer security solutions.
13
2. Which of the following is an example of a strong password? a. b. c. d. Password J*p2le04>F My dog has eas! Your real name, username, or company name
3. True or false: If you have a perimeter rewall on your network, you dont need to turn on Windows Firewall. a. True b. False 4. How can you prevent intruders from accessing your wireless network? a. Encrypt network trafc with Wi-Fi Protected Access (WPA) or Wired Equivalent Privacy (WEP) b. Restrict access to trusted Media Access Control (MAC) addresses c. Both 5. True or false: If you set antivirus software for auto-updates, you dont need to enable Windows Automatic Updates. a. True b. False
14
6. True or false: Small businesses are not targets for hackers. a. True b. False 7. What is phishing? a. Spoofed e-mail messages and websites that fool recipients into divulging personal information b. A type of computer virus c. An example of a strong password d. None of the above 8. What product can you use to update all the computers on your network? a. b. c. d. Windows Update Services (WUS) Microsoft Internet Information Services (IIS) Bluetooth Networking Microsoft Baseline Security Analyzer (MBSA)
9. What method(s) can you use to protect sensitive data from prying eyes? a. b. c. d. Passwords File permissions Encryption All of the above
10. How often should you perform an incremental backup? a. b. c. d. Daily Every other day Weekly Monthly
15
Answers to the security quiz appear below. If you didnt answer all the questions correctly, refer to the section Seven Steps to Better Security to learn more about security issues that concern small businesses. 1. d. You should use Automatic Updates, antivirus software, and Windows Firewall. You should never open e-mail attachments from an unknown source. 2. b and c. A strong password has a mixture of different character types. Passphrases make very secure passwords. 3. b. False. You should use a perimeter rewall and a local rewall, like Windows Firewall. 4. c. Both. You should encrypt your network and limit access. 5. b. False. Automatically updating your antivirus software does not also automatically update the Windows operating system. You should also enable the Windows Automatic Updates feature. 6. b. False. Small businesses are often direct targets of attacks and can also be affected by attacks on larger companies. 7. a. Spoofed e-mail messages and fraudulent websites are designed to fool recipients into divulging personal nancial data, such as credit card numbers, account usernames, and passwords. 8. a. WUS. WUS provides a solution to the problem of managing and distributing critical Windows updates that resolve known security vulnerabilities and other stability issues in the Windows operating systems. 9. d. All of the above. You can protect sensitive data by using strong passwords, assigning le permissions, and enabling encryption. 10. a. Daily. An incremental backup includes all data that has changed since the last backup. You should perform an incremental backup daily if you are using this method as part of your backup solution.
16
Automatic Updates
An important part of helping to keep Windows XP secure is keeping it up to date with the latest software updates that Microsoft has released. Automatic Updates can locate critical and security updates, download them, and install them automatically. SP2 provides several enhancements to the Automatic Updates feature in Windows XP, including the ability to download more categories of updates, better bandwidth management, and consolidation of updates so that less user input is required.
Windows Firewall
In the original release of Windows XP, the software-based rewall included with the operating system was named Internet Connection Firewall. With the release of SP2, this rewall has been renamed Windows Firewall and adds several new features. The updates include enabling Windows Firewall by default on all network connections, improving the user interface,
17
improving application compatibility when Windows Firewall is on, and providing a way to congure global settings for all network connections.
Internet Explorer
Security enhancements to Microsoft Internet Explorer provide improved protection against malicious content on the Web and also provide interface enhancements that make conguring security easier. A new Information Bar consolidates many of the dialog boxes Internet Explorer uses to provide information to users. Internet Explorer now includes a built-in pop-up window blocker as well as a feature called Manage Add-ons that lets you disable the scripting capabilities that allow rogue sites to hijack Internet Explorer and force you to go to their sites.
Outlook Express
SP2 also provides security enhancements for users of the Microsoft Outlook Express e-mail program. You can block external content from being automatically downloaded and displayed in HTML-formatted messages and even congure Outlook Express to display messages only in plain text format. You can also block potentially unsafe attachments that are sent through e-mail messages, and instant messages are isolated so that they cannot affect other parts of the system.
Wireless Support
A new interface in SP2 makes it easier to nd a wireless network by telling you what networks are available, their strength, and their type of security. You can easily move between networks, if necessary. The Wireless Network Setup Wizard makes establishing a wireless network virtually painless. Furthermore, new wizards step you through conguring security features for your wireless network, whether you use the old WEP or the new, much stronger, WPA.
Security Center
Security Center is a new feature that provides a central interface showing the status of security congurations on a computer, including settings for Automatic Updates, Windows Firewall, and some non-Microsoft antivirus software. Security Center also runs as a background service and provides real-time alerts when certain security conditions are detected. Armed with the enhanced security technologies that SP2 provides, you will experience a more secure desktop environment than ever before. For more information and to nd out how you can get Windows XP SP2 at no cost, visit www.microsoft.com/windowsxp/sp2/default.mspx
19
Step 1
If you take only three precautions to help safeguard the computers you use in your business, make them the following: Update your software. Help protect against viruses. Set up rewalls. Taking these actions wont keep you completely safe from security threats and productivity loss, but together they give you a powerful rst line of defense.
however, software products have become more secure. For example, Microsoft Windows XP Professional is inherently more secure than Microsoft Windows 95. Windows XP Professional with SP2 provides even stronger security settings that help defend against hackers, viruses, and worms. But that doesnt negate the importance of downloading and installing appropriate updates as soon as they are released. Manually install updates for Windows
Windows XP Professional:
Go to the Windows Update website (http:// windowsupdate.microsoft. com), and then click Scan for Updates. The website automatically analyzes your computer, determines which updates you need, and then makes them available for download. To make the update process easier, enable the Automatic Updates feature. With this feature, Windows XP Professional can monitor for, download, and install updates automatically (depending on the settings you select).
What Version of Windows Do I Have? If you are unsure which version of Windows you are running, its easy to nd out. Microsoft provides an online tool that can determine your version of Windows (including any Service Packs installed). Just use these steps:
1. Go to www.microsoft.com/protect/ 2. Click the Find out which version of Windows your computer is using link at the bottom of the page.
You can also determine your Windows version manually (and without going online) by using the following steps:
1. Click Start, and then click Run. 2. In the Run dialog box, type winver, and then click OK. 3. In the About Windows dialog box that appears, look for the installed version of Windows and any Service Packs that are installed.
Windows 2000:
If youre running Microsoft Windows 2000 as part of a domain or as a standalone computer, visit the Windows Update website (http://windowsupdate.microsoft.com), where you will find the latest service packs, device drivers, applicationcompatibility information, and system security updates. In a domain environment, server computers running Microsoft Windows 2000 Server or Windows Server 2003 manage the security for all resources on the network.
21
Windows Me, Windows 98, Windows NT, and Windows 95: Older versions of Windows, such as Microsoft Windows Me or Windows 98, are much less secure than newer versions. Microsoft strongly encourages upgrading to newer versions of Windows to ensure the highest level of security. Automatically download and install updates on a computer running Windows XP Professional 1. Click Start, and then click Control Panel. 2. In Control Panel, double-click System. 3. In the System Properties dialog box, click the Automatic Updates tab (Figure 2). 4. Select the Automatic (recommended) option. 5. From the drop-down lists, select the day and time each day to download and install updates. 6. Click Apply, and then click OK. You can also keep current with security updates for Microsoft Ofce. These updates and other downloadable add-ins are available by going to the Ofce Update website (http://ofce.microsoft. com) and clicking Check for Updates.
resources. Some allow outsiders access to your les. Viruses can replicate, or copy, themselves, even send themselves to e-mail addresses in a contacts list. Virus-infected computers can spread the virus throughout your company and cause serious downtime and data loss. You also risk infecting the computers of clients and customers you communicate with via e-mail. Basic steps you can take
Did You Know?
You should have antivirus protection on all your computers. Antivirus software works by scanning the contents of incoming e-mail messages (and les already on your computer) to detect virus signatures. If the software nds a virus, the software deletes or quarantines it. Install antivirus software
A survey conducted by America Online found that 20 percent of home computers were infected by a virus or worm and that various forms of snooping programs are on 80 percent of computers. Despite that, more than two-thirds of home users think they are safe from online threats.
Because hundreds of viruses are released each month, all antivirus software must be updated regularly with the latest signature denitions so that the software can catch the latest viruses. Look for software that automatically downloads the latest denitions and programs from the Internet. (If your company uses laptop computers, see the sidebar Taking Special Care of Laptop Computers on page 26.) Here are links to antivirus programs from some of the better-known security software makers: AVG Anti-Virus: www.grisoft.com/ Norton AntiVirus: www.symantec.com/smallbiz/nav/ McAfee VirusScan: www.mcafee.com/ Panda Titanium Antivirus: www.pandasoftware.com/ BitDefender: www.bitdefender.com/ Microsoft Malicious Software Removal Tool: visit www.microsoft.com/downloads/ and type Malicious Software Removal Tool into the Search box
23
Never open suspicious les Make sure everyone in your company understands that they should deletewithout openingany e-mail attachments from an unknown, suspicious, or untrustworthy source.
24
Ofce Outlook 2003 makes available (free of charge) monthly updates to its junk e-mail lter. Users are advised to download these updates routinely to help counter new deceptive e-mail tactics. To learn more about the security and spam-blocking features in Ofce Outlook 2003, visit the Ofce Outlook 2003 Web page: www.microsoft.com/ofce/editions/prodinfo/junkmail.mspx For Junk Mail Filter updates, visit http://ofce.microsoft.com/en-us/ofceupdate/ and click Downloads for Ofce 2003. To upgrade to Outlook Express 6.0, download and install Internet Explorer 6.0 from the Ofce 2003 Downloads Web page: www.microsoft.com/windows/ie/enthusiast/videos/email.mspx To learn more about viruses, read the article 7 things to know about virus writers at www.microsoft.com/smallbusiness/ issues/technology/security/7_things_to_know_about_virus_ writers.mspx
Set Up Firewalls
If you have an always-on broadband connection, chances are that your companys computer network is randomly probed by criminal hackers. When intruders stumble on a valid computer address, they try to exploit vulnerabilities in software to gain access to your networkand ultimately individual machines. Basic steps you can take Like a moat around a castle, a rewall can block intruders from gaining access to your private network. There are two basic types of rewalls: Perimeter rewalls. These rewalls block all trafc between the Internet and your network that isnt explicitly allowed. For example, you may want to congure the rewall to accept certain kinds of e-mail and Web trafc but reject all 25 Seven Steps to Better Security
other types of trafc. Firewalls can also hide the addresses of the computers behind your rewall, making individual computers on your network invisible to the outside. A rewall may be integrated into a router or DSL/cable modem or a software product like Microsoft Internet Security and AccelerAcceleration (ISA) Server. Local rewalls. Local rewalls must be installed on each computer. The Windows Firewall in Windows XP SP2 is \ enabled by default, which means that, by default, all the connectionsincluding LAN (wired and wireless), dial-up, and Virtual Private Network (VPN) connectionsare protected.
Taking Special Care of Laptop Computers Laptop computers are a tempting target because they are easy to steal and to sell. Think of it as leaving a pile of cash equal to the cost of the laptop just lying around. Besides the hassle and cost of replacement, there is the risk that a stolen laptop computer contains hard-to-replace or condential information. If you use a laptop computer, consider these special precautions: Use a strong password. Make sure you shut down the laptop computer when it is unattended. Keep the laptop computer within sight, particularly in crowded public areas like train stations and airport security checkpoints, but also at meetings and conferences. Keep your laptop computer in your carry-on luggage, and dont leave it in hotel baggage-hold rooms. Dont carry laptop computers in cases stamped with a manufacturers logo or in cases that look too much like a laptop case. Keep a record of your laptop computers serial number and all the software or accessories you use. Back up all the work stored on your laptop computer before a trip and, if possible, continue to make backups of work you do on the road. Sending new documents home by e-mail is one way to do this. Use the Encrypting File System (EFS) to secure condential les. For advice on this process, see Microsoft support article 223316, Best Practices for the Encrypting File System, at: http://support.microsoft.com/default.aspx?scid=kb;EN-US;223316
26
If your computers are not running Windows XP, you can purchase a commercial local rewall. The following software vendors sell commercial rewall software: ZoneLabs (www.zonelabs.com) McAfee (www.mcafee.com) Symantec (www.symantec.com)
Step 2
Implementing a regular backup procedure is a simple way to help safeguard critical business data. Setting permissions and using encryption will also help. Much of the misfortune that small businesses experience can be blamed on outside
27
forcesa poor economy, a natural disaster, a decision by a key employee to leave. Its no surprise that those who survive the down times are typically those who minimized their risks by taking basic precautions. One of the most basic precautions of all is protecting critical business data. Just imagine walking into your ofce one morning and discovering that all your sales records, customer contact information, and order history had disappeared. How long would it take you to recover? How much disruption and delay would occur? What would it cost you? Data loss can and does happen. It can result from hardware failure, ood, re, security breach, or just an accidental deletion of an important le. Whatever the cause, taking precautions to reduce the impact is like an insurance policy, enabling your business to get back up and running quickly.
data after a crash, this method will take longer because you rst have to restore the full backup, then each incremental backup. If such a process is a concern, another option is to run a full backup nightly; just automate it to run after-hours (Figure 4). Test your backups frequently by actually restoring data to a test location. In this way, you can: Ensure backup media and backed-up data are in good shape. Identify problems in the restoration process. Provide a level of condence that will be useful during an actual crisis. Establish permissions Both your desktop and server operating systems can provide protection against data loss resulting from employee activities.
Figure 4. Back up critical data and test the backups by restoring them.
29
With Windows XP and Windows 2000as well as Microsoft Windows Small Business Server (SBS) 2003, Windows Server 2003, and Windows 2000 Serverit is possible to assign users different permission levels based on their roles and responsibilities within your organization. Rather than giving all users Administrator accesswhich is not a best practice for maintaining a secure environmentinstitute a least privilege policy by conguring your servers to give individual users access to specic programs only and specically dening user privileges. Encrypt sensitive data Encrypting data means that you convert it into a form that disguises the data. Encryption is used to ensure the condentiality and integrity of the data when the data is stored or moved across a network. Only authorized users who have the tools to decrypt encrypted les can access these les. Encryption complements other access control methods and provides an added level of protection for securing data on computers that may be vulnerable to theft, such as mobile computers or les shared on a network. Windows XP and Small Business Server 2003 support Encrypting File System (EFS) to encrypt les and folders. Together, these three practices should provide the level of protection most businesses require to keep their data safe.
Why You Should Test Your Backups Erik was the managing director of a growing architectural rm. With 30 employees and several multinational clients, the company relied on its e-mail system to keep in touch and to track client requests. Then, one afternoon, the e-mail server had a catastrophic hardware failure, and the data became corrupted. No problem, thought Erik, our support guy has a backup, so we can just restore it from that. In fact, the company had an elaborate tape library and dutifully kept offsite copies of its critical backups. It was only after a days work of trying to restore the e-mail system from the backup tapes that they realized the data hadnt been properly backed up. They had never noticed the problem and had never tested to see whether restoring the data worked properly. They did not have any kind of disaster recovery plan in place.
30
Step 3
Unscrupulous websites, as well as pop-ups and animations, can be dangerous. Set rules about Internet usage to protect your businessand your employees. If your business doesnt have a policy on Internet use, it should. Though the Web can be an incredibly useful workplace tool, it can also cause signicant workplace havoc that can result in lost productivity. Setting some rules protects your business and your employees.
31
Provide two copies of the policy to employeesone for them to keep and another for them to sign and return to you. (For more information, see the section Creating a Security Policy, later in this guide.)
32
Step 4
Remote access to your network may be a business necessity, but it is also a security risk you need to monitor closely. Use strong passwords and be especially cautious about wireless networks. Nobody likes to think the worstthat around every corner someone is snooping into your business affairs. But if your company operates either a wired or wireless network and has information that you would like to keep condential, a little paranoia will serve you well.
33
computer, blocking intruders from accessing your private network and controlling what your employees can access outside your network. Perimeter rewalls protect all the computers on your network. They also offer an additional layer of defense because they can effectively make all your network computers invisible to the outside world. Use strong passwords Most small businesses use passwords to authenticate identity, whether on computers, cash registers, or alarm systems. Although more sophisticated authentication systems exist, such as smart cards and ngerprint or iris scans, passwords are most common because they are easy to use. Unfortunately, they are also easily misused. Hackers have automated tools that help them crack simple passwords in minutes. Crooks may also use fraud to get employees to divulge passwords. Too often, passwords are not effective for these reasons:
Sensitive documents have not been passwordprotected, allowing anyone to walk up to an unsecured computer and log on. Passwords are weak or are never changed.
Did You Know? According to studies at Michigan State University and elsewhere, up to 70 percent of identity thefts are conducted by insiders or people posing as insiders. Strong passwords help protect against this kind of threat.
Educating your staff about the importance of passwords is the rst step in making passwords a valuable network security tool. Employees should regard their passwords the same way they would an ofce key. In other words, dont leave it lying around and dont share it. Employees should also avoid weak and easy-to-guess passwords that include the following:
34
Their real name, username, or company name A common dictionary word that makes them vulnerable to dictionary attacks, in which a program attempts to use words found in a dictionary to log on to a system Common passwords, such as password, letmein, or 1234 Commonly known letter substitutions, such as replacing i with ! or s with $ A password that someone else knows Using no password at all, which makes it easy for other employees to just walk up to an unsecured computer and log on Any password that they write down What does a strong password look like? It should have the following characteristics: Be at least eight characters long (the longer, the better) Have a combination of lowercase and uppercase letters, numbers, and symbols Be changed at least every 90 days and, when changed, should be signicantly different from previous passwords Of course, a password you cant remember is no use at all. There are some tricks that can make strong passwords more memorable: In Windows 2000 and Windows XP, you can use a passphrase such as I had 5 chicken tacos for lunch. You could also pick a phrase, then use only the rst character of every word, such as Msi5Yold! (My Son is 5 years old!). Another trick is to take short, simple words and join them together with numbers and symbols (for example, Tree+34+Pond).
35
Use wireless security features Wireless networks use a radio link instead of cables to connect computers. As a result, anyone within radio range can theoretically listen in or transmit data on the network. Freely available tools allow intruders to sniff for insecure networks. While vulnerability increases with a wireless network, computer-savvy crooks have tools to help them break into all types of computer systems. Security features are built into Wi-Fi products, but manufacturers often turn the features off by default to make network setup easier. If you use wireless networking, make sure you turn the security features on and use the security and access features that will make your network more secure. Also consider these tips: Restrict wireless access (if your wireless network provides this feature) to ofce hours or whenever you expect to use the network. Filter out casual intruders by setting access points to restrict network access to specic computers. Use the encryption built into your wireless access point to encode information as it travels across the network and prevent any non-authorized party from reading or changing data.
War Driving Anyone with a laptop computer, an inexpensive wireless network card, freely downloaded software, and an antenna made from something as simple as a can of potato chips can hack into wireless networks. Most wireless networks are completely unsecured. Indeed, many manufacturers of wireless devices leave encryption turned off by default. Users tend not to enable wireless encryption or use any other added security measures, making it a relatively easy task for anyone with a wireless setup to nd and exploit the connection. War driving is more than a geek prank. Some intruders seek to access les and damage systems. Fortunately, securing a wireless network is relatively easy, and the majority of war drivers can be deterred or deected by a few simple steps.
36
Close unnecessary network ports Network trafc for various applications are identied using numbered ports. In order for an applications trafc to get through a rewall, the rewall must allow trafc on that port. To strengthen your networks security against unauthorized access, close unused or unnecessary ports by using perimeter rewalls, local rewalls, or Internet Protocol Security (IPSec) lters. But a word of caution: Microsoft server products use a variety of numbered network ports and protocols to communicate with client and server systems. Blocking ports that the Microsoft Windows Server System uses may prevent a server from responding to legitimate client requests, which could mean the server wont function properly, if at all.
Step 5
If you think of your servers as your networks command center, its easy to understand why keeping them safe from attack is mission-critical. When your servers are compromised, your entire network is at risk. While some server attacks are merely annoying, others can cause serious damage. If you have a small business, you may not have more than one or two servers. But no matter how few or how many servers 37 Seven Steps to Better Security
your business is running, your network relies on them. They serve the applications, Web pages, or e-mail that your team needs to do their jobs. They store valuable and condential information resources. They provide a means for your customers to communicate with you, perhaps even purchase goods or services from you. So, if your servers are down, you lose productivity, you jeopardize customer relationships, and you may even take an economic hit.
network resources. Rather than giving all users Administrator accesswhich is not a best practice for maintaining a secure environment for workstations or serversyou should use your servers to manage client computers. Windows servers can be congured to give individual users access to specic programs only and to dene which user privileges are allowed on the server. In this way, you ensure that users cant make changes in areas that are critical to server or workstation operation. It also prevents users from installing software that may introduce a virus or spyware to their computers, which in turn can compromise the integrity of your entire network. Understand your security options Todays server operating systems are more secure than ever, but the powerful security settings you nd in Windows Server System products are good only if they are used appropriately and monitored aggressively. If your team doesnt have an IT specialist or expertise in security issues, consider hiring an outside consultant to help appropriately protect your servers.
39
40
For example, a salesperson could use the program to record her sales numbers while a manager creates a customized nancial report. But there are also security risks to such setups. Customer information, sales gures, prot and loss statements, and other vital business data located on a network server are vulnerable to intruders. And you may not want all employees to have access to all kinds of data. The challenge is to create a security plan that protects LOB program data integrity and privacy, yet also supports efcient data access and collaboration. For more information, see the sidebar Understand Your Business Requirements.
41
Back up les. Disasters happen, and if you havent saved your important les and information on a separate storage system, all your critical business application data could be lost. Small Business Server 2003 includes a backup feature that is easy to use. Update your software. Software updates typically include the latest security features. Updates for Microsoft products are available from Windows Update and from the Microsoft Download Center. Regulate access to information Not everyone should have access to everything in your workplace. If your business runs a Windows Server operating system, you can restrict employee access to documents, spreadsheets, or other business les. You can also designate whether a user is permitted just to read a le or to change it. Follow these tips for regulating access: Assign permissions and privileges to groups of users rather than to individual users. Doing so saves time administering access rights. Create your groups based on roles, such as Sales Representatives. Then, assign a set of permissions that are relevant to performing the tasks dened for that role. Set access rights for each group to the minimum levels required for users to do their jobs. Pay attention to the database Because business-specic programs typically use a database to store application data, remember to pay special attention to database security. Here are several steps you can take: Install the most recent database service packs. The premium edition of the server software ships with the more advanced Microsoft SQL Server 2000. When using these database programs in conjunction with your
42
business programs, make sure to install the latest service packs and updates for improved security. The Microsoft Download Center has the latest server applications updates. Assess your servers security with MBSA. MBSA is a free tool you can download and use to scan your standalone or networked computers for security vulnerabilities. With MBSA, you can easily nd missing security updates for Windows 2000, Windows XP, and Windows Server 2003 systems. MBSA also works with desktop applications such as Ofce and server applications such as Microsoft Exchange Server. After scanning your computers, MBSA provides information about locating and installing necessary updates. Whenever possible, use existing domain user accounts and passwords for connections to SQL Server databases instead of creating new accounts. Users wont have to remember multiple usernames and passwords, and this technique also helps protect you from most Internetbased attacks against the database. Isolate your server and back it up regularly. Physical and logical isolation make up the foundation of SQL Server security. Computers hosting a database should be in a physically protected location. Back up all data regularly, and store copies in a secure offsite location.
Microsoft Business Solutions Customer Relationship Management Some LOB applications take much of the work out of setting access rights. One example is Microsoft Business Solutions Customer Relationship Management (CRM), a sophisticated program that tracks customer sales and support relationships. Microsoft Business Solutions CRM typically runs in combination with Small Business Server 2003 and comes with eight predened roles that range from CEO-Business Manager to Customer Service Representative to Marketing Professional. The program also predenes common business elements to which you can assign rights, such as Leads, Opportunities, Contacts, Accounts, Competitors, Products, Sales Literature, Quotes, Orders, Invoices, and Contracts.
43
in time and money because of the efciencies you gain, such as: Timely updates. You can deploy updates and security xes, along with new versions of software, from the server to users computers. In this way, you know the updates have been applied properly and in a timely manner, and you dont have to rely on users remembering to do it themselves. You can also test updates before deployment and make sure that computers on the network apply only the proper updates. Special congurations. If your organization has preferred settings for the operating system or the applications everyone uses, these can be managed, updated, and enforced organization-wide from your server. In addition, you can prevent users from installing unauthorized programs by restricting their ability to run programs from CD-ROMs and other removable drives or to download programs from the Internet. Monitoring. If unauthorized access or a system failure on a computer occurs, such a situation can be detected immediately through the monitoring capabilities available in a managed environmenta server-based network on which monitoring software is used. If youre considering a rst server or a server upgrade for your business, its worth noting that improvements in the management capabilities of Windows Server 2003, together with the enhanced security features in Windows XP Professional with SP2, offer a powerful defense against internal and external threats.
45
46
Teach Your Employees About Security You can lock down servers and desktop computers, install rewalls, and keep software updated, but one of the toughest parts of securing your business can be getting your employees to follow security guidelines. Fortunately, if you teach your employees why security matters, show them the security policies you have in place and why those policies are there, and encourage them to help enforce those policies, your employees can actually become your rst line of defense against intrusion. Include your employees when you are creating your security plan. If you make them part of the process, they will be more motivated to help make the plan a reality. Hold training sessions for employees in which you teach them important security techniques. In particular, show them how to spot spoofed e-mail messages, make sure that the operating system and antivirus software are kept up-to-date, and use strong passwords. You should also teach employees how criminal hackers may try to get information from them. Employees should not leave passwords written down where people can nd them. They should also never give out usernames or passwords over the phoneeven to someone they think they should trust. Finally, employees should be encouraged not to discuss condential information or security precautions in public areas. Hackers often try to trick or persuade employees into disclosing condential information, a technique referred to as social engineering. Prepare written policies for employees for using the Internet and e-mail, using company computers for personal projects, and so on. Have your employees sign a copy of the policy so that they understand how serious you are about security. You should also discuss the consequences of not following company policy. Continually train new and existing employees on security issues and policies. Above all, you must communicate with your employees about security. It should be a topic they hear about frequently so that following good security techniques becomes a habit.
47
Remote Access Policy. Outlines acceptable methods for remotely connecting to the internal network, such as whether employees are allowed to connect to the network from their home computers. Information Protection Policy. Provides guidelines to users on the processing, storage, and transmission of sensitive information. Virus Protection Policy. Provides baseline requirements for the use of antivirus software as well as guidelines for reporting and containing virus infections. Password Policy. Provides guidelines for how user-level and system-level passwords are managed and changed. Firewall Security Policy. Describes, in general, how rewalls are congured and maintained, and by whom. For more information about security policies, visit www.sans.org
48
Assess
Review your own skills and knowledge. Decide whether outside help or training is required and nd a consultant, if necessary. Analyze your current state of security. Use our questionnaire, seven-step plan, and the MBSA. The MBSA is a free program that scans single systems or multiple systems across a network for common system miscongurations and missing security updates. View the MBSA at www.microsoft. com/technet/security/tools/
Identify assets that need to be protected, such as hardware, software, data, documentation, and people. Also identify account information, administrative procedures, and legal comcompliance. Categorize your information according to its sensitivity. Use the following scale: public (website data), internal (marketing data), condential (payroll), and secret (patents). Identify required services. Include services such as remote access and e-mail. Predict threats. Include threats such as spoong, tampering, repudiation, information disclosure, DoS, and elevation of privilege. Consider using trusted third parties to test exposure. Calculate exposure for each asset and service against each threat. Use the formula probability x impact = exposure to generate an ordered list of security priorities.
Plan
Remember that the objective is not to eliminate all risk regardless of the cost, but to minimize the risks as much as possible. There are three main tradeoffs:
- Functionality versus security required - Ease of use versus security - Cost of security versus risk of loss
For each risk, plan how to transfer, avoid, mitigate, or (worst case) live with it. Create a plan that:
- .Includes a policy dening the organizations security requirements and acceptable use - Has procedures for preventing, detecting, and responding to security incidents - Provides a framework for enforcing compliance - Reects the culture of the organization and the resources available for implementation
Create a plan for dealing with a security breach (for example, a virus attack): Creating a Security Plan 50
- What are the goals and objectives in handling an incident? - Who should be notied in case of an incident? - How will you identify an incident and determine how serious it is? - What should happen when an incident occurs?
Create a project team. Include management and staff. Give everyone clearly dened roles and responsibilities. Create a project time line. Write it all up, and make sure everyone agrees to it.
Execute
Communicate with staff and provide regular training where necessary. Test measures for technical adequacy and obtain participant feedback. Modify the plan, if necessary. Carry out the plan.
Monitor
Research new threats, and include new risks as you become aware of them:
- Subscribe to security bulletins. - Train users.
Modify the plan when changes occur in personnel, the organization, hardware, or software. Conduct ongoing maintenance, such as virus updates, new user training, and backups. For more information about how to assess and manage security risks, see the Microsoft Security Risk Management Guide at www.microsoft.com/technet/security/guidance/secrisk/default.mspx. This guide addresses recommendations for large organizations and for small businesses with stringent security needs. Many of the approaches discussed may be helpful for understanding how to reduce security risks in your small business. 51 Creating a Security Plan
52
Section 1: Introduction
This plan was developed by Matthew, Managing Director of Adventure Works, in cooperation with other key members of the Adventure Works staff. About Adventure Works We are a 20-person rm specializing in high-adventure travel packages. Our staff includes designers, travel agents, sales and marketing personnel, and the administrative team that supports them. The staff also includes the senior management of the business: the co-founders, Matthew and Denise, and the nancial controller, Steve. Objectives This security plan is our rst. We will take a broad view of the security risks facing the rm and take prompt action to reduce our exposure. Everyone remembers the virus attack we had earlier this year, and we hope to avoid another disaster like that! However, I hope that by taking a wider view, we may be able to plan for threats we dont know about yet. I realize that we are limited in time, people, and (of course) cash. Our main priority is to continue to grow a successful business. We cannot hope for Central Intelligence Agency (CIA)-like security, and it wouldnt be good for our culture to turn Adventure Works into Fort Knox. The project team has weighed these constraints carefully in deciding what to do and has tried to strike a balance between practicality, cost, comfort, and security measures. We are all convinced, however, that doing nothing is not an option. I am taking responsibility for leading this review and ensuring that all the action items are carried out. I am concerned about the risks we face, although having reviewed the plan, I am sure we can address them properly. This project has my full support and is a high priority for the business. Circulation Because this document contains important security information, it is condential. You are requested to keep it under lock and key
53
when not actually using it, and please dont leave it lying around or make photocopies. We will not be sending this document via e-mail or storing it on the serverpaper copies only, please. The following people are authorized to view this document: Matthew (Managing Director) Denise (Operations Director) Steve (Financial Controller) Kim (Staff Manager) Sutton and Sutton (our lawyers) Jeremy (our outside security consultant) Project Team The project team includes: Denise, project leader Steve Kim Jeremy, advising our staff and carrying out some of the implementation In addition, we consulted with members of staff from sales, marketing, and design to get their feedback about what they wanted and how the plan might affect them.
54
Each member of the project team has read the available security planning guides from Microsoft and the Internet Engineering Task Force (IETF) in preparation. The company as a whole is reasonably technically literate, but (with one or two exceptions) they see computers as tools to get the job done and dont know much about how they work. Our Network and Systems Desktops: Twenty-two (one per member of staff plus two old machines acting as print servers) Laptop computers: Six (one each for the directors, one for Steve, and three for the sales team) Printers: Two (one high-end plotter and one printer-fax combo unit for general use) Servers: One (running Small Business Server 2003 and looking after les, the Internet connection, e-mail, and our customer database) Internet connection: 1.5 Mbps cable modem connection The server and several of the computers are linked by 100 Mbps Cat5 Ethernet cables. The remainder are linked by an 802.11g wireless network with an access port. All computers run Windows XP Professional except for the two print servers and two administrative computers, which run Windows 98. Security We compared each computer against the checklist in the Security Guide for Small Business. We also ran the MBSA. These actions produced the following results: Virus protection: Not present on six computers; not up to date on four computers; generally, most users were aware of viruses but were a bit unsure about what they could do to prevent them. Spam-ltering software: Many users have begun to complain about spam, but no protection is in place. Firewall: We thought the ISPs router included a rewall, but it doesnt; so, we dont have one.
55
Updates: All the Windows XP Professional systems are up to date because they were automatically checking and downloading updates. However, several installations of Microsoft Ofce need updating, and the Windows 98 computers are not updated at all. Passwords: A random sampling found that most people arent using passwords at all or had them written on Post-it notes. In particular, none of the laptop computers are password protected. Physical security: We had the insurance people in last year, so the window locks, doors, and alarms are pretty good. However, none of the computers have a serial number etched on its case, and we didnt have a log of the serial numbers. We also noticed that everyone, including Tracy and the two directors, are using the same printer, which means that there is a risk of condential documents being left there by accident. Laptop computers: All the laptop computers had shiny bags with big manufacturer logos. No security locks. Wireless networking: Were wide open here. It turns out that we just set the thing up and it worked, so nobody touched any of the settings. The wireless network is open to people who have wireless access capability to snoop on the network or freeload on the Internet connection. Web browsing: Everyone thinks that having fast Internet access is a great perk, but they are using it all the time and without much thought to the risks. Through a content ltering audit, we found that 20 percent of our Web browsing was unrelated to work. We dont have a policy on acceptable use, and no one is taking any security measures. Backups: We back up data on the server to a Digital Audio Tape (DAT) drive on a weekly basis, but we havent tested restoring the data; unless people remember to copy local les to the server, those les arent backed up, which is unsatisfactory. The server contains our primary customer database, so well-tested backups are essential, as is keeping a copy of backups offsite.
56
Assets Besides the physical property, our main assets are: Our product designs and marketing collateral Records of our contracts with vendors Our e-mail database and archive of past e-mail messages Sales orders and the customer database Financial information Line-of-Business (LOB) software for online booking and reservations Paper legal records stored in various ling cabinets All these assets are considered secret and should be accessible only on a need-to-know basis. In addition, they need to be protected and backed up as safely as we can manage. Risks We believe the risks break down into four main categories: Intruders (viruses, worms, hijacking of our computer resources or Internet connection, and random malicious use). These are the risks that anyone using computers connected to the Internet faces. High risk, high priority. External threats (rivals, disgruntled ex-employees, bad guys after money, and thieves). They are likely to use the same tools as hackers, but in deliberately targeting us they may also try to induce members of staff to supply condential information or even use stolen material to blackmail or damage us. We need to protect our assets with physical and electronic security. High risk, high priority. Internal threats. Whether accidental or deliberate, a member of staff may misuse his or her privileges to disclose condential information. Low risk, low priority. Accidents and disasters. Fires, oods, accidental deletions, hardware failures, and computer crashes. Low risk, medium priority.
57
Priorities 1. Intruder deterrence: Installing rewalls Installing and updating virus protection Strengthening the wireless network Replacing the four computers running Windows 98 with computers running Windows XP Professional with SP2 Ensuring that all computers are congured to be updated automatically Educating users and explaining policies Theft prevention: Helping protect laptop computers Inventorying and mark assets Moving the server into a secure, lockable room Physically securing desktop and laptop computers Disaster prevention: Creating better backup plan with offsite storage Ensuring backup of users local data Storing copies of critical paper documents offsite Regularly testing the backups by performing a restore Internal security and condentiality: Creating a strong password policy Securing printers for accounts, HR, and directors Reviewing security for ling cabinets and condential documents
2.
3.
4.
58
4. Congure computers running Ofce Outlook 2003 to use Junk e-mail ltering. Select, purchase, and install spamltering software on the mail server, if necessary. 5. On the wireless network, disable service set identier (SSID) broadcasting, choose and congure a sensible SSID, enable WPA encryption, enable MAC ltering, and congure the access point to allow trafc only from the desktop and laptop computers in the ofce. 6. Replace the four computers running Windows 98 with computers running Windows XP Professional with SP2. 7. Review all machines to make sure that they are fully updated, and set them to automatically refresh those updates. 8. Buy new, nondescript laptop computer bags and locks. 9. Security mark all desktop computers, laptop computers, and their components. 10. Log all serial numbers. 11. Buy and install desk security locks for desktop computers. 12. Find a suitable, lockable room for the server and move it there. 13. Review backup and restore procedures. Ensure that user data is either stored on the server or copied across regularly prior to backups. Implement daily backups. Ensure that a full backup goes offsite once a week. Ensure that the backup is password protected and encrypted. Review paper documents and make photocopies for secure offsite storage of critical documents. 14. Congure Small Business Server 2003 and individual machines to enforce reasonably strong passwords. Discuss with users what would be an acceptable balance of convenience and security. (We dont want them writing down their new passwords.) 15. Congure workstations to log users out and require a password to log on again if the workstation is idle for more than ve minutes. 16. Buy cheap printers for accounts, HR, and the two directors so that they can have private documents printed securely.
59
Policy Changes Kim will update the staff handbook to include new policies on: Acceptable use of e-mail and the Internet Use of passwords Who can take company property away from the ofce After she has completed a rst draft, it will be reviewed by the directors and the companys attorneys before being rolled out. User Education We expect to give up to two hours of user training in small groups as a result of these changes. Training will cover: The importance of security Passwords Laptop computer security Virus prevention Safe Internet browsing Updating software and operating systems from a server Introducing the new staff policies Making sure employees understand the consequences for not complying with policies Assessing employees understanding of the new policies Periodically reviewing the practice of the new policies Project Time Line and Responsibilities The top three prioritiesrewall, virus protection, and strengthening the wireless networkwill receive urgent attention from our security consultant, Jeremy. The remaining tasks will be done by our own staff in order of priority. We expect the top three priorities to be completed within a week and the remaining tasks within 30 days. Steve will be responsible for purchasing and implementing the technical changes. Kim will be responsible for all the policy and training requirements. Denise will oversee the project and be responsible for any other tasks that arise.
60
Response Planning In the event of a security breach, we will contact Jeremy. His company has a one-hour response policy during ofce hours and a four-hour response policy at all other times to deal with serious incidents, such as virus infections. In addition, Steve will monitor the server and rewall regularly to make sure that no breaches have occurred. Ongoing Maintenance and Compliance Steve will be responsible for security on a day-to-day basis, with Denise taking overall responsibility. Steve will continue his own self-education on the topic, subscribe to security bulletins from Microsoft and our antivirus software supplier, and liaise with Jeremy on a regular basis to monitor compliance with the new policies. On a monthly basis, Steve will make sure that Windows and our antivirus software are updated and that the backup and restore procedures are working properly. He will also be responsible for ensuring that new computer equipment is properly congured and up-to-date. Kim will be responsible for ensuring that new staff joining the company are fully trained in the companys security policies and procedures. There will be a full, formal review of this plan in six months.
61
Professional Advice Sutton and Sutton to review our rewritten staff policies Jeremy for advice during the creation of this plan Jeremy for help with implementation Internal Resources Although we are not paying for our own staff directly, to be clear about the allocation of resources and the time that is available for this work, we have authorized the use of internal staff as detailed above.
62
Information Online
You should consider this guide a starting point for securing your business. The following sites provide additional technical information and security guidance.
For information about small business technology and security guidance, go to www.microsoft.com/smallbusiness/ www.microsoft.com/smallbusiness/gtm/securityguidance/ For information about starting and running a small business, go to www.asbdc-us.org www.uschamber.com www.sba.gov www.entrepreneur.com http://sbc.nist.gov For consumer and end-user information, go to http://safety.msn.com www.microsoft.com/athome/security/ For business software and productivity solutions, go to www.microsoft.com/ofce/ www.microsoft.com/windows/ For server information, go to www.microsoft.com/smallbusiness/gtm/encomm/freetrial.mspx www.microsoft.com/smallbusiness/products/server/sbs/detail.mspx For information about genuine software and the law, go to www.microsoft.com/genuine/small_business.mspx?displaylang=en www.bsa.org For explanations of technical terms, visit www.howstuffworks.com www.webopedia.com For general information about security and safety, visit www.microsoft.com/protect/ www.microsoft.com/security/ www.microsoft.com/spam/ www.microsoft.com/senderid/ www.microsoft.com/technet/security/topics/hardsys/default.mspx www.symantec.com www.isalliance.org For information about computer crime, visit www.usdoj.gov/criminal/cybercrime/ www.gocsi.com www.kensington.com
63
Information Online
For mobile networking and VPNs, go to www.microsoft.com/technet/security/topics/mobile/default.asp www.microsoft.com/smallbusiness/gtm/mobilize/hub.mspx For information about backups, go to www.microsoft.com/windowsxp/home/using/howto/maintain/ backup.asp For detailed advice about writing a security plan and for sample policies, go to www.microsoft.com/technet/archive/security/bestprac/bpent/ bpentsec.mspx www.sans.org For information about Internet ltering software, go to www.websense.com www.securecomputing.com For more technical information, go to www.microsoft.com/security/ www.microsoft.com/technet/security/default.mspx www.cert.org/tech_tips/home_networks.html www.ja.net/documents/factsheets.html For rewalls, go to www.microsoft.com/technet/security/topics/network/rewall.mspx www.mcafee.com www.symantec.com www.zonelabs.com For antivirus software and e-mail security, go to www.grisoft.com www.symantec.com/smallbiz/nav/ www.mcafee.com www.pandasoftware.com www.bitdefender.com To get software updates for Windows and Microsoft Ofce, go to www.windowsupdate.com www.ofceupdate.com For a complete glossary of security terms, go to www.microsoft.com/security/glossary.mspx
Information Online
64
www.microsoft.com/smallbusiness
2005 Microsoft Corporation. All rights reserved. Microsoft, MSN, Windows, Outlook, Exchange Server, Windows Server, SmartScreen and the Microsoft logo are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. 0305 Part No. 099-93165