Best Practices For…

Single User or SOHO Environment:

For the end-user/home network, we recommend a good-better-best approach that is practical and cost-effective and has corresponding levels of enhanced security. These practices can be used for either PC or Mac platform that is either new or already exists on the network.

Good:

  • Begin by choosing a password at least 8 character in length and that utilizes, upper and lower case, numbers, symbols for all computers and devices on your network.
  • All firmware and bios are updated for all appliances on the network. This includes but is not limited to: printers, wireless routers, hubs/switches.
  • All Windows service packs and Mac critical updates are applied.
  • A security suite from a major vendors is installed properly and updated every four hours or sooner.
  • An entire system scan has been run and set to run periodically.

Better:

  • Begin by choosing a password at least 8 character in length and that utilizes, upper and lower case, numbers, symbols for all computers and devices on your network.
  • All firmware and bios are updated for all appliances on the network. This includes but is not limited to: printers, wireless routers, hubs/switches.
  • All Windows/Mac critical updates and service packs are applied.
  • A security suite from a major vendor is installed properly and updated every four hours or sooner.
  • An entire system scan has been run and set to run periodically.
  • A SOHO network firewall is properly installed and updated as needed.

Best:

  • Begin by choosing a password at least 8 character in length and that utilizes, upper and lower case, numbers, symbols for all computers and devices on your network.
  • All firmware and bios are updated for all appliances on the network. This includes but is not limited to: printers, wireless routers, hubs/switches.
  • All Windows/Mac critical updates and service packs are applied.
  • A security suite from a major vendors is installed properly and updated every four hours or sooner.
  • An entire system scan has been run and set to run periodically.
  • A mid-level network firewall is properly installed, updated and is proactively protecting all seven layers of network security.

View Best Practices For Business, EDU or Government »