Security Measures for Small and Medium-Sized Enterprises – Threats to Software

Software is the user interface most commonly used by hackers who wish to manipulate data. It is subject to several restrictions and threats which may place an organisation’s operation in jeopardy. This section is specifically dedicated to malicious software (or ‘malware’).

Unsuitable Software Environment

To run correctly and fulfil its roles, IT hardware must have the appropriate software. It involves:

Use of Unapproved Software

The use of unapproved software may lead to the infringement of rights related to the software used or to the introduction of computerised processing. It may may prejudice the company, and so it is important to ensure that the company’s IT environment is not disrupted by unsuitable software, by which we mean unauthorised to attain the organisation’s objectives. It is important to ensure that the following measures are put in place:

Unavailability of Administrators

Administration of a computerised resource (hardware and/or software) allows you to react to events related to its environment and to adapt the system accordingly. It is important to ensure that the resource is operable, in particular for solutions provided by third parties, especially those where a single supplier is the only one with knowledge of the administration procedure. Make sure that: