BNMC Blog

By accepting you will be accessing a service provided by a third-party external to https://www.bnmc.net/

Tip of the Week: Three Basic Access Control Considerations

Tip of the Week: Three Basic Access Control Considerations

While every aspect of your organization’s security is incredibly important to attend to, we wanted to take the time and delve into a particular aspect that many might take for granted: your digital access controls. Let’s go over a few tips and practices to ensure your access controls and policies are optimized.

When it comes to the permissions that a business’ assorted users need to use inavigate ts network, most businesses turn to Microsoft Active Directory to help manage them. Simply put, Active Directory allows you to review and distribute access to the assorted resources found on your network and other user capabilities. However, whether you use Active Directory or another solution, the following practices and policies apply:

Keep Permissions in Check

One of the most crucial parts of your data security is the process of restricting access to your data (and your business as a whole) to only those who need it. For most businesses, there is no reason for anyone--especially a non-employee--to enter the premises in the middle of the night. Furthermore, different employees shouldnt have the same access as each other, simply because they have different access needs. Will one of your newly-hired employees need the same access as you do? Almost certainly not, so there is no reason to allow such a thing to ever take place. Make sure your network permissions are reviewed and corrected periodically.

Establish Role-Based Permissions

On the subject of restricting permissions, a utilitarian policy is generally best to follow. Will one of your users need access to a given resource in order to successfully do their job? If not, don’t give them that access. By assigning these permissions based on work roles, you can granularly give your team members the access they need, without unnecessarily exposing your data to individual employees who may not need a certain asset.

Optimize and Supplement Password Policies

A strong password policy is an absolute must when it comes to your data security. Not only do these passwords need to be strong, they should need to be updated frequently. This will help prevent users from sharing their passwords, or reusing old ones.

Because there are so many passwords that everyone is expected to remember nowadays, the strength of these passwords has suffered. Combining this with the fact that cybercriminals now have stronger tools than ever to crack passwords, the username/password combination is often no longer sufficiently secure. To remedy this, implement two-factor authentication, which makes a cybercriminal’s job that much harder.

Need help with these steps, or any other part of your business’ technology? We can help! Give BNMC a call at 978-482-2020 to speak to one of our IT professionals!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, July 07 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Business Computing Privacy User Tips Cloud Email Network Security Hackers Hosted Solutions Microsoft Computer Business Software Efficiency Malware Communication Data Google IT Services Small Business Workplace Tips IT Support Mobile Devices Cloud Computing Tech Term Hardware Internet Managed IT Services Data Recovery Smartphone Android Backup Ransomware Mobile Device Innovation Users Outsourced IT Information Upgrade Saving Money Windows Smartphones Phishing Data Backup Miscellaneous Facebook Cybersecurity Business Continuity communications Disaster Recovery Microsoft Office Business Management Browser Windows 10 VoIP Server Social Media Office 365 Managed IT Services Network Productivity Data Management Windows 10 Passwords Internet of Things Vulnerability Remote Monitoring App Gmail Gadgets Word Apps Artificial Intelligence Quick Tips Mobile Office Infrastructure Encryption Managed Service Chrome Managed Service Provider Information Technology Save Money Employer-Employee Relationship Networking Virtual Reality VPN Access Control Analytics Website Applications Government Router BYOD Company Culture IT Support Money Settings Tip of the week Remote Workers Development Robot Antivirus Google Drive Bandwidth Automation Content Filtering YouTube HIPAA BDR Risk Management Education Apple Storage IT Management Data Security Paperless Office Office Tips Virtual Private Network Computers Hacker Data storage Unified Threat Management Big Data Employee-Employer Relationship Display Spam Collaboration Firewall WiFi Maintenance Avoiding Downtime Document Management Humor Data Breach Customer Relationship Management Scam Chromebook Hosted Solution Best Practice Windows 7 IT Administration Break Fix Social Network Wireless Solid State Drive Mouse Software as a Service End of Support Search Going Green Training Mobile Security Remote Computing Hard Disk Drive Remote Work Business Technology SaaS Printing Server Management Wi-Fi Password Touchscreen Compliance Business Intelligence iOS Virtualization Laptop Managed IT Holiday Data loss How To The Internet of Things Tablet Conferencing Telephone Systems Retail Alert Regulations desktop Managed Services MSP Outlook Augmented Reality Computing Downtime Operating System Two-factor Authentication Marketing Managing Stress Bring Your Own Device Vendor Management Social OneNote Monitors LiFi Managed IT Service Nanotechnology Spyware Typing Gamification Wearable Technology Network upgrade Uninterrupted Power Supply Mobility Batteries Specifications Alerts USB File Sharing Current Events Co-Managed IT Heating/Cooling Multi-Factor Security Social Engineering Motherboard Cables Computer Care IBM Websites Fraud Cost Management Onboarding GDPR Time Management Printer Twitter Policy Halloween Identity Continuity Managed Services Provider Screen Reader Charging Identity Theft Cryptocurrency Slack Hard Disk Drives COVID-19 Smart Office Print Toner Myths Black Friday Google Docs Messaging Emergency Holidays Licensing Dongle IT solutions Content Huawei Servers Google Calendar Safety Wires Corporate Profile Dark Web Distribution Assessment Automobile Hacks Digital Signage Data Warehouse Network Management Procedure Scary Stories Solar G Suite Entertainment Vendor Smart Tech Bitcoin Monitoring Solid State Drives Network Congestion Running Cable Work Dell Google Wallet Shortcuts Mobile Management Cyber Monday WannaCry Business Growth Employee-Employer Relationships Payment Card Cooperation Service Level Agreement Cabling Streaming Processor Legislation Buisness Voice over Internet Protocol Hybrid Cloud Microsoft Excel Logistics Virtual Desktop Hotspot Internet Exlporer Google Maps Troubleshooting Business Analysis SharePoint Writing PCI DSS Sports Legal Connectivity Windows 8 Spying National Security Techology IT Technicians Optimization Unified Communications Drones Security Cameras Profiles Smart Technology Analysis Students Lenovo Dark Data Update Inventory Staff Leominster Human Error Memory Statistics Modem FinTech Scalability Mail Merge Blockchain Asset Management Language Value Mobile Device Management Virus Downloads Deep Learning Politics IoT Digital Payment Updates VoIP Unified Threat Management Peripheral Mirgation Recycling Utility Computing Shortcut Distributed Denial of Service Digital Alt Codes Mixed Reality Firefox Superfish Customer Service Shadow IT Cybercrime K-12 Schools Disaster Device Reducing Cost Bluetooth Comparison Work/Life Balance Cookies Migration Consulting Address Permissions Health Private Cloud Memes Computing Infrastructure Professional Services LED Threats Office Samsung Social Networking Tech Support Star Wars PowerPoint User Error Management Chatbots eWaste Budget Laptops Patch Management Webcam Law Enforcement Electronic Medical Records Financial Notifications Physical Security Error Emoji Point of Sale Ben McDonald shares Upgrades Gadget Travel Crowdsourcing Personal Information Botnet Regulation Supercomputer CrashOverride Cortana 3D Printing Staffing Motion Sickness Machine Learning Administrator Processors Taxes IT Budget Web Server what was your? Unsupported Software GPS Computer Repair Relocation Printers IT Consultant Mobile Data Cameras Tracking Recovery Meetings How To Mobile Computing Cleaning Black Market CCTV

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3