Momentum - Business to Business Online Magazine MOMENTUM November 2019 | Page 22

TECH DAVID ALCORN Franchise Owner NerdsToGo League City www.nerdstogo.com/location/league-city-tx/ IMPLEMENTING A DOMAIN The First Step in Securing Your Small Business I walked into a local small business to setup a printer for the ability to scan to email, when I noticed the administrator’s desktop. There were so many active ex-employees stored on the machine – with administrator accounts of course – that I was left speechless. They’ve had professional services in the past, but were never provided a total solution or, at least, educated. This is something EVERYONE needs to understand, because it can bring your company to its knees. Picture this: There are 4 doors in your home – the front door, back door, garage door, and the shed with all different keys. There are six members in the home, and they all have a key to each door. When one person leaves on bad terms, the only way to keep them out is to remember to take all 20 MOMENTUM 4 keys, change the locks, or any other method to remove their ability to gain access with the keys they possess. The solution would require a little work up front, but what if all the doors had the same lock? When the person leaves, there is only one key to obtain and their access is denied. The common lock is your domain, and the keys are your user accounts. When a domain is created, a manager(server) needs to be placed in the environment. The server is required due to its ability to run multiple services at once and “serve” its domain members or “clients.” All management items must be purged from the local computers, that were once operating as individual managers, and allowed to have all policies provided by the domain controller. When an employee is hired their account is created, following some common naming convention. That account would obtain the same permissions on any computer in that domain. When that employee becomes a former employee, that user account can be disabled from the domain controller and will no longer have system access. This is the first step in setting up a security framework as well as preparing for the management of files, folders, security policies, updates, etc. This system implementation is an implementation that only needs to happen once with upgrades thereafter. The incidents experienced companies neglect to implement a framework truly outweigh the capital required to deploy. This is acceptable in a small home, not in a small business.