Seven ways to maintain server security

Source: Internet
Author: User

Do you have some important data on your server that you don't want to disclose? Of course not. Recently, however, the risk of the server is particularly large, more and more viruses, malicious hackers, and those commercial spies are the server as a target. Obviously, the security of the server can not be ignored for a moment.

It is impossible to talk about computer security in an article, after all, there are many books on the market, but I can tell you seven tips for maintaining server security.

Skill One: start from the basics

It's the safest way to start from the basics. You must convert all areas of the server that contain confidential data to NTFS format, and antivirus programs must be updated on time. It is recommended that you install antivirus software on both the server and desktop computers. The software should also be set to automatically download the latest virus definition files on a daily basis. In addition, the Exchange server (mail server) should also install antivirus software that scans all incoming e-mails for infected attachments, and if a virus is found, the message is immediately quarantined, reducing the chance of the user being infected.

Another good way to protect your network is to limit the user's ability to log on to the network depending on the employee's working hours. For example, employees on the day class should not have permission to log on to the network at middle.

Finally, access to any data on the network must be logged through the password. Forcing everyone to set a password, you must mix uppercase and lowercase letters, numbers, and special characters. There is such a tool software in Windows NT Server Resource Kit. You should also set the password to be updated regularly, and the password must be no less than eight characters in length. If you've already done this, but you're still worried about the password, you can try downloading some hacker tools from the network and test how secure those passwords are.

Tip Two: Securing Backups

Most people don't realize that the backup itself is a huge security breach. Imagine, most of the backup work at night 10 o'clock or 11 o'clock start, depending on the amount of data, after the completion of the backup is probably midnight. Now, imagine that it's four o'clock in the morning, and the backup work is over. A person with a heart can steal a backup disk at this time and recover from a server in his or her own home or your competitor's office. However, you can prevent this from happening. First, you can use a password to protect your disk, and if your backup program supports encryption, you can also encrypt the data. Second, you can set the time for your backup to go into the office in the morning, so that even if someone wants to sneak in and steal the disk in the middle of the night, the disk is in use, and if the thief takes the disk by force, he can't read the damaged data.

Zebian: Bean Technology Application



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.