A Quick Look At Information Security


Define security policies

Picture
Creating security policies is essential. If you have data flowing through different programs, devices and outlets, and no control over who has access to it, this can be a huge security risk. Policies must be set defining which users have access to data. Some users, such as clients and sources will not need information to sensitive company data, while some users such as secretaries and sources may not need access to confidential client data. These policies must be clearly defined in order to avoid a huge disorganized mess with many security holes. With the Bring Your Own Device (BYOD) movement taking hold in many real estate brokerages, mobile access policies must be defined as well. Other policies should include passwords, antivirus, firewall, Wi-Fi, software development, logging and account management.  You can find many policy defining templates here


Secure the office network

If you have an office, it will have either a wired or a wireless network. A firewall (or router) should be configured to monitor all incoming and outgoing traffic for protection of company data on all office computers, as well as agents (and clients) who may use laptops on the wireless network while visiting. Web filtering should be set up in order to prevent malware from being installed by malicious sites. An intrusion detection system must be in place to prevent hackers from gaining access, as well as logging so any intrusion attempts, successful or not, will be logged. The access point (such as a router) should use the strongest encryption available (WPA2) and should be protected by a very strong administrator password.

For more information, be sure to check out the Top 10 Tips for Real Estate Agent Information Security in order to better protect and control your information.






Leave a Reply.