Best Practices for Employees to Protect the Company From HackersWith employees working at home and visiting personal sites at work, their guard is often let down. Here's a guide to Internet browsing done safely.

ByDirk Anderson

Opinions expressed by Entrepreneur contributors are their own.

In today's online world, technology users are essentially in a state of near-constant attack. Almost every day there's a new data breach in the news involving a well-known company and quite often fresh rules for protecting personal information are circulated. Because of malware in email, phishing messages and malicious websites with URLs that are one letter different from popular sites, employees need to maintain a high level of awareness and diligence to protect themselves and their organizations.

Phishing activities are especially pervasive, including attempts to steal users' credentials or get them to install malicious software on their system. The astonishing success rate of phishing attacks makes them a favorite. My company, Coalfire, regularly conducts phishing exercises for our clients as part of their testing and training programs and have seen results where better than 70 percent of people will follow the link to a phony website and, of those that followed the link, 30 percent to 50 percent will routinely give up their user names and passwords.

Related:Prepare for the Attack of the Data-Sucking Cyber Zombies

Many like to think about the network perimeter with all its firewalls and other fancy technologies as the front line in thecyber war, but the truth is there's a whole other front. Every single member of a company's staff who uses email or the Internet is also on the front line, and these people are generally considered a softer target than hardware or software. It's simple: If the bad guys can get an employee to give up his or heruser credentials or download some malware, they can likely waltz right past the technological controls looking for all intents and purposes as if they belong there.

For starters, employees should not use their work computer for personal business and vice versa. Most home systems and networks simply don't have the protections in place that a well-managed corporate environment generally has. There's been a lot of hubbub over the last few months about the cost for businesses to upgrade from Windows XP sinceMicrosoft will no longer be providing security patchesfor it. Yet some people are still happilyrunning Windows 2000 at home200年和微软没有更新可用0 in more than four years.

Some people let their personal antivirus software expire and take a month (or a year) to get around to renewing it -- if they ever do. Many people will operate their home computers with weak or even no passwords and with their only protection from Internet threats being the rudimentary security capabilities of their DSL router or cable modem, which they will gladly disable to make it easier for their Xbox, PlayStation or Wii game console to connect with strangers from all over the world.

In addition, when using a computer for personal functions, a user generally has to have the ability to install software and modify the system configurations. Typically, such administrative functions are not available to all users in a corporate environment. As a result, even if an organization has made an effort to improve a system's security, a user doing work on a personal computer has the ability to disable and circumvent protections and has the privileges to allow for the installation of malware.

As companies migrate toward a world of bring-your-own-device policies, some companies are developing strategies to help address these risks. Bt as a rule using a work computer for personal reasons or doing work on a personal computer (or tablet or smartphone) can significantly change the threat level that an employer has to protect itself against.

To help their organization protect systems and data, employees need to implement some smart web browsing habits. Smart web browsing means engaging in the following activities:

Related:8 Mostly Free Best Practices for Tightening Internal Data Security

1. Keep the browser updated.

Next to a computer's operating system, the most critical software to keep up-to-date is the web browser and any plug-ins it uses (like Adobe Flash or Java). These types of integrated applications allow code from Internet websites to run locally on your computer and, as a result, are among the most commonly exploited by malicious code.

2. Learn about the browser to disable unused plug-ins.

For the same reason, if doing a lot of random surfing is done, consider keeping plug-ins and scripting disabled except when on a known, trusted site. This can help prevent "drive-by" malware that runs through JavaScript or through plug-ins like flash and infects infects a computer after a visit to a site.

3. Beware of downloads.

Malware can be hidden, not just in applications or installation programs, but in what appear to be image and video files also. To limit the likelihood of downloading content that contains malware, only download from reputable sites. With sites that are not a household name, take the time to do a little research and see if other people have had issues.

Additionally, be sure that antivirus software is set up to automatically scan downloads. Or scan downloads manually, even when receiving them from name-brand sites, as it is not unheard of for infected files to make their way onto otherwise legitimate web sites. This is especially true for file-sharing sites where the site owner cannot control every piece of content a user may place there.

4. Be wary of unscrupulous sites.

Those running sites already breaking the law by illegally distributing copyrighted materials -- like pirated music, movies or software -- probably have no qualms about including malicious content in their downloads or stealing information.

5. Heed alerts.

Many popular web browsers today have built-in functionality that provides an alert when visiting a website that is known to be dangerous. And if the browser doesn't give a notice, the antivirus software may provide that function. Heed the alerts!

Part of the fun of searching the Internet has always been discovering what's out there. But just like when visiting a new city, avoid some places after dark. And never wander into others at any time. Be alert.

Employees need to protect their devices from online and in-person threats. Start by keeping the company's system patched. Configure it to automatically apply updates or at the very least issue notifications when there are updates and then apply them as soon as possible. This doesn't just apply to the operating system. Keep all installed applications updated. Sometimes this takes a little extra work, especially if a lot of niche software is used.

Remember, the challenge of security is that the bad guy needs to find only one hole in a security system to get past it, so fix them all. Think of it as putting dead bolts on doors but leaving the basement window open.

To that end, security professionals like to debate the usefulness of today's antivirus software. And it's true that malware continues to become more sophisticated and harder to detect. But it always amazes me how old some of the malware running around is. As a result, use antivirus software -- and keep it up-to-date.

Also, use a host-based firewall, either the Windows firewall or one provided in an antivirus package. This is especially true for laptops connected to public wireless access points -- like at hotels or coffee shops -- and also on a home system. It just provides that extra layer of defense.

And finally, please, don't ever give passwords to anyone. Be vigilant and question anything new, especially emails and forms in the web browser that request work credentials, no matter how nicely the request is made.

Related:Protecting Your Computer Against the Threat Posed by Humans

Dirk Anderson

Regional Vice President of Coalfire's Central Region

Dirk Anderson is the regional vice president of the central region ofCoalfire, an information- technology governance, risk and compliance firm in Denver. He has 15 years of experience in the field of information technology.

Editor's Pick

Related Topics

Business Culture

Why Recent Layoffs and Unaddressed Employee Grief Are Hurting Your Company's Bottom Line

Communication can go a long way in creating trust, stability and vision in an organization's very unstable time of grief. This will, in turn, improve the company's bottom line as well.

Business News

Opening a New McDonald's Franchise Will Be More Expensive in 2024

Starting January 1, franchise royalty fees will rise from 4% to 5% for new locations in the U.S. and Canada.

Business News

'Bar Tab Was Almost 80%': Restaurant Slams Well-Known Columnist After He Goes Viral For Claiming His Meal Cost $78

A photo of a burger and fries from 1911 Smokehouse BBQ at Newark Airport went viral for its alleged price, but the restaurant says the man didn't factor in his many alcoholic drinks.

Money & Finance

Want to Become a Millionaire? Follow Warren Buffett's 4 Rules.

企业家是不能过度指雷竞技手机版望太多a company exit for their eventual 'win.' Do this instead.

Business News

This Job Wants to Pay You $2,500 to Binge Netflix and Watch the Streamer's Biggest Shows

It's time to put those couch potato skills to good use.

Business News

'An Absolute Prize': Rare Great Depression $10,000 Bill Sells For Nearly $500,000

The $10,000 bill is from 1934 and was never in circulation.