Skip to main content

14.1.1 Securing Workstations

Learn the best practices when securing workstations and keeping stored data private and secure.

Securing Databases

Many organizations rely on databases to keep their data secure. One of the most common methods that database providers use is BitLocker, an encryption feature offered by Windows-based systems. BitLocker is designed to prevent unauthorized data access even if the physical device storing the data is moved to a different hardware system.

Organizations typically handle payment processing and customer billing information in a completely separate sector of their servers (if they're handling it in-house), and this information stays encrypted at all times. There are three types of database encryption:

  • Transparent-Data-Encryption
  • Column-Level-Encryption
  • Application-Level-Encryption

Enforcing Password Security

Passwords are the first line of defense in securing any computer network. Passwords should be safe, complicated strings of characters that combine capital and lowercase letters, along with numbers and special characters. They shouldn't include any PII about the person that made the password, i.e. the password shouldn't be able to be derived or guessed simply by knowing about the person.

Organizations should also always enable MFA. Oftentimes, organizations require their employees to change their passwords on company-managed accounts. This is unreliable, since human nature dictates that they'll take the easiest route and simply add an extra character and call it good.

All of these tips and tricks will help shape a good password policy that will protect your organization from most basic attacks.

Educating End Users

The biggest problem-causer in technology is human error. Educating end users is the biggest and most important step in ensuring network security. Ensure that your User-Education-&-Awareness-Policy is up-to-date.

Protecting Hardware

Ensure that computers are kept safe and locked when not being used. Utilize screensaver locks that require the user to re-enter their password after leaving their computers inactive for a brief moment.

#XIV

#Aplus