You are on page 1of 2

Online Fraud Protection

www.ParkBankOnline.com

Network Security Best Practices


Experts recommend that you conduct an • Conduct ‘test’ phishing attacks on your
initial risk assessment of your online and employees.
operating systems. These best practices have • Perform and maintain a complete asset
been collected from various industry sources. inventory; take steps to securely dispose of
Park Bank makes no recommendation as to hardware and software.
which best practices are appropriate for your • Monitor third-party vendors and their
business. Since every business is unique, Park products to ensure secure remote access
Bank strongly recommends that you contact implementations.
your IT professional to evaluate your system • Don’t allow company-issued workstations
and suggest best practices for your business. to be used as personal computers. Do not
allow employees the ability to install any
• Install updated anti-virus and anti-spyware personal software or downloads (games,
programs and firewall on all computers file sharing, personal email accounts) from
annually. Ensure that they are enabled and the Internet.
configured for automatic updates. • Prohibit the use of personal USB drives,
• Keep all security programs, along with the portable hard drives or other unauthorized
operating system and software, up-to-date devices to be connected to company
with the most current patches. If operating systems.
system is discontinued, patches may no • Use multi-factor authentication wherever
longer be available. Upgrade to a newer possible (tokens, PINs, digital certificates,
operating system. etc.).
• Centrally manage both physical and • Use mobile or email alerts and
systems access. Audit system activities, notifications for high-risk activities.
such as successful and failed user logins, • Make sure your card processing systems
file and system access. All operating and hardware are Payment Card Industry
systems, and most applications such as compliant.
firewalls, have the ability to audit system • Secure data on mobile phones and
activities. portable flash drives with password entry.
• Back up files incrementally (daily) and • Prevent users from sharing login
fully (weekly). Test restore function to credentials.
ensure backups are working as intended. • Require strong passwords, having at least
Another option is to use an external hard eight characters. Incorporate upper and
drive or website service to back up. Keep lower case letters, numbers and special
backups off site. characters. Do not use dictionary words.
• Consider encryption of sensitive data. • Educate employees about social
• Conduct an external network penetration engineering scams in the office, such
test (simulates a targeted attack on your as fake employment interviews, fake
systems via the Internet) to identify vendors or phony contract bids or rogue
vulnerabilities in your organization’s media such as USB drives found near the
systems. entryway or in a public area.

02/2015 Member FDIC


414.466.8000 / www.ParkBankOnline.com

• Be careful what you download, open • Use an authorized, separate administrator


or click on because this action can account for installing or removing
circumvent even the most vigilant anti- software.
virus software. Be wary of forwarded • Know the warning signs of when you may
attachments from people you do not know. have a problem:
• Turn off your computer when not in use, • Know your computer. If acting
which severs an attacker’s connection to strangely (slow response time,
other company resources. excessive pop ups, etc.) check it out.
• Use bookmarks in your Web browser • Know when to expect your account
for entities with which you regularly statements. Better yet, use online
communicate. functionality to review activities daily.

Tips from leading experts: Create a security agreement:


• Use a dedicated PC for conducting online • Have all employees sign a security
banking activities. agreement in order to demonstrate that
• Restrict remote access users and they are taking cyber security seriously
applications. and are active participants in helping to
• Never give out your password, account maintain a secure online environment.
number, ID, or credentials via email,
the Web, text messages, or telephone.
Park Bank will never ask for confidential
information via email.
• Retire “end of life” hardware and software
that have no security patches available.
• Consider a network firewall with unified
threat management capabilities. This will
provide another layer of protection from
viruses, spam and other targeted attacks
on your network.

02/2015 Member FDIC

You might also like