Share, , Google Plus, Pinterest,

Print

Posted in:

Church Data Security – 12 Steps to Help You Reduce Your Vulnerability to Serious Risks


Churches have joined the masses in utilizing the internet to store information. While the internet provides access to your information anytime and anywhere, it can be dangerous if your data is not secure. It is essential that you ensure your data is protected from unauthorized users. Below are 12 steps to help you reduce your vulnerability to serious risks.

1. Install Virus Protection

Help to prevent virus infections on your computer by installing a well known anti-virus and spam filter. Anti-virus software needs to be installed on each computer including any networked computers.

2. Automatic Updates

Set up your anti-virus protection to automatically receive online updates. This will guarantee that your computer is always protected with the latest version of anti-virus software.

3. Back-up Data

You should back-up all of your data on a regular basis to a device separate from your computer. This will ensure you have a copy of your data in the event of a computer crash or any other type of disaster. There are also services offered to churches, businesses and individuals to do this remotely now.

4. Do not open suspicious attachments

Never open an email attachment from someone that you do not know. These emails should be deleted immediately. If a bogus email is discovered, send a message to other team members warning them to ensure no one makes the mistake of opening the message.

5. Scan all attachments

You should scan all of your email attachments prior to opening them. Your anti-virus software can alert you if any suspicious data exists within an attachment.

6. Set up a firewall

Setting up a firewall will help protect your network from unauthorized visitors. It screens out any unrecognized visitors.

7. Passwords

Ensure that you use passwords that can not be guessed easily. Do not use birthdays, dates of special occasions, social security numbers or simply words such as password. Always select passwords that you can remember so you do not have to write them down.

8. Downloading Software

Do not download programs from web sites that you do not trust. Freeware or Shareware sites are known for containing harmful data.

9. Securing the Perimeter

Prior to leaving, ensure that all doors, cabinets and windows are locked. Make certain that no sensitive documentation have been left out on desks or printers. Choose an online document management company to store your paper documents online and remote.

10. No Sharing

Never share disks or USB drives. You are not aware of what another person has downloaded and you do not want to expose your system to a virus.

11. Connect remote users securely

If you allow users to connect remotely, make sure you use encryption and authentication to properly verify their identity.

12. Keep software up to date

There are always new threats so to help protect your computer, always download the latest Microsoft or browser updates and patches immediately.

Michael Buban has 16 years in the litigation and corporate printing business. His company specializes in document management,document hosting, scanning, coding and conversion as well as software development and Document Management. For more information on document management services in the Dallas, Texas area, check out http://www.idoccorp.com.