intY launches free IT security white paper for small businesses

SMEs rarely have the resource or knowledge to deal with the complexity
of IT security threats and are opening themselves to data security
breaches and legal action by employees and customers, according to
research by intY.

In response, the secure Internet and e-mail company has launched a white
paper to help small businesses negotiate the IT security minefield.  The
paper explains how to simply identify potentially harmful security risks
with a step-by-step guide and ways to introduce controls by carrying out
a security audit.  The whitepaper is available to download at

intY's network security whitepaper outlines not just the external
threats such as viruses, spam and hackers, but also internal threats:
many small businesses do not realise that they have a legal
responsibility to protect employees from harmful Internet and e-mail

Mark Herbert, managing director of intY, said: "We have researched this
document to help small businesses understand the very real IT security
threats that they face.  Small businesses need to realise that not only
must they protect their own systems from hackers and viruses, but they
must comply with important legislation about employee's Internet and
e-mail access.  The step-by-step guide on how to identify the risks,
comply with the legislation and protect the IT network should help stop
damage being done to British small businesses."

intY's research identifies the following major security threats to a
small business:

* Viruses - destroy or disable crucial IT systems and data
* Spam - affects employee productivity, whilst offensive content can
open a company to legal action from employees
* Hackers - unauthorised network access through security holes
* E-mail and Internet misuse - employees' misuse of access to resources
* Denial of Service - hackers overload an e-commerce website to prevent
legitimate users gaining access
* Data Protection - personal data of customers must be kept secure
* Online Fraud - security of website credit card transactions

intY suggests that a security audit is carried out to identify specific
threats.  Once completed, a security policy can be implemented, which
may include security controls such as:

* Information back-up
* Anti-virus and anti-spam software
* A Firewall
* Written and physical access controls and filtering
* A Virtual Private Network (VPN)

Comments (0)

Add a Comment

This thread has been closed from taking new comments.

Editorial: +44 (0)1892 536363
Publisher: +44 (0)208 440 0372
Subscribe FREE to the weekly E-newsletter