When it comes to protecting your computers and networks, there is no room for compromise. Customers demand reliable, top-notch service from small and mid-size operations, just as they would from larger collision repair facilities. You need to block any and all threats to your systems, both internally or externally (the Internet):
- Viruses and other forms of malware can compromise your network and end-user systems. This can lead to data loss and expensive downtime for your shop.
- Spam clogs your mail in-boxes and e-mail servers, costing time and money.
- Spyware is designed and targeted to steal valuable information from specific companies and users.
- Phishing attacks exploit end-users to steal personal information.
Did you know that the number of phishing e-mails sent to adults has almost doubled since 2004? These e-mails look to be authentic and from reputable companies, but in reality they come from thieves wanting to steal your personal information. The average amount of money lost by victims has grown from $257 in 2004 to $1,244 today, according to a recent Gartner Group report.
Security threats are being refined every day, as hackers exploit new conduits, such as instant messaging, peer-to-peer connections and wireless networks, to deliver their attacks. I receive at least one update a day for one of the security products within the Collision Industry Electronic Commerce Association's (CIECA's) operation. As wireless becomes more pervasive, the ability to tap into a local network becomes easier to accomplish. Without proper security, anyone within range of your wireless network can attach themselves and attack your systems.
Regardless of the purpose of the attack, if it is not stopped, it will cost you time and/or money.
In addition, employee misuse of the Internet can cause all types of headaches for small- to medium-sized businesses.
The challenge seems overwhelming for those businesses that don't have the budget or IT resources to deploy and manage such safeguards. Ask your broadband service provider to take more responsibility for protecting your network. You might discover that they have a plan built just for your business.
Additionally, CIECA has provided a Business-2-Business Security Guideline document that may help you. It can be found on the CIECA Web site at www.cieca.com. There is a link to this document on the home page.
Don't skimp on security. Security softw-are and systems do more than protect your data — they protect your reputation.
Fred Iantorno is the executive director of CIECA.