Aug 24

Your Top 10 Security Steps to Protect Your Data, Part 2

2. Ensure operating system security
Use the security features of your operating system to restrict access to important data. The network administrator should provide access only to individuals authorized to administer and maintain the system or the database/s. In addition, they should:
• Track system user IDs and passwords.
• Restrict access to the actual database application and file directories, servers, and web pages.
• Review remote access settings for file sharing and FTP (File Transfer Protocol).
• Restrict file upload or download access.
• Make sure all users have the latest, most secure versions of the operating system software.
• To streamline processes, you can enable external authentication, which uses accounts that have been configured in the Windows Domain Authentication or in Apple OpenDirectory.
• Do not put your database files on file servers to share them. Choose a database with a built-in networking feature. This will prevent files from being inappropriately copied, or from introducing record locking and potential corruption issues when files are shared with inappropriate methods.

Special Offers for Summer:

FileMaker 9 Software Bundle
FileMaker Pro, FileMaker Server, and more!
Get 10 people up & running TODAY using this robust database.
Available for PC and MAC.
Download, save nearly $1200

Leave a Reply