NAIFA's Advisor Today Keyword(s)

 E-mail   Print  Share

Your Computer Security Checklist

Here are 10 things you can do to keep your valued information out of the hands of ne’er-do-wells.


If you think your office isn’t an attractive target for hackers, think again: Small businesses face the same online threats as large corporations, according to studies done at Symantec. The information that you handle every day to make sure you’re doing the right things for your clients is not the kind of information you want to make accessible. Part of cultivating a trustful relationship with your clients is making sure that this data cannot be compromised.

This checklist of recommended security practices, offered by Symantec, can help you ensure that your information is protected. Share this list with everyone in your office, so that your entire team knows how to guard that trust.

  1. Install antivirus software on all desktops, laptops and servers to prevent virus infection.
  2. Use a firewall on all desktops, laptops and servers to block intruders.
  3. Stay current on operating system and security-software updates to ensure you have the latest protection.
  4. Create strong passwords with at least eight characters combining alphanumeric and special characters. Change passwords every 45-60 days.
  5. Open email responsibly. Never open attachments from unknown senders. Don’t respond to spam.
  6. Enable the security settings on your web browser and do not enable file sharing.
  7. Back up important data regularly and store extra copies offsite.
  8. Secure all remote computers with antivirus and personal firewall software. Evaluate the benefits of a virtual private network (VPN) that provides a private “tunnel” to your business.
  9. Secure wireless connections with a VPN and install firewalls.
  10. Follow routine physical-security precautions—from using the screen-locking feature to locking down laptops with a cable.

This list is reprinted with permission from Symantec. More helpful resources are available at


Related Articles

Connecting With The Women’s Professional Market

Taking Care Of An Incapacitated Family Member

New Business? Or Now Business?

Train Your Customers To Think Of You First

Get The Job Done Right—Without Doing It Yourself

Your Computer Security Checklist

The Secrets Of LTCI Sales Success

See other articles about Business/ Tech Tools

Conference Newsletter

Contact Us   |   Reprint Permission   |   Advertise   |   Legal Notices   |   Join NAIFA   |   Copyright © Advisor Today 1999-2017. All rights reserved.

AT Blog
Product Resource
Digital Magazine