|
|
Email Security: Protecting Your Personal and Small Business Accounts
Email is an essential communication tool for both personal and business use. It's crucial to protect your email accounts from cyber threats such as hacking, phishing, and spam. In this article, we'll discuss the importance of email security and provide recommendations for both personal and small business users to secure their accounts. Personal Email Security Considerations
Microsoft is rolling out the next iteration of its operating system, Windows 11. Of course, new = better, right? But, when it comes to Windows 11, you may want to consider waiting. Here’s why.
Typically, software updates are something to install as a matter of course. The manufacturer, after all, is delivering the latest and greatest in its upgrade. This can be new efficiencies, improved processes, and increased security. CNN calls the Windows 11 release “the biggest update we’ve seen to Microsoft PC software in more than half a decade.” But when it comes to Windows 11, do some research first. You may not want to be an early adopter. When to Upgrade There are still people using Windows 7, even though the system is no longer supported by the manufacturer. That, we do not recommend. Without support or security updates, these systems are vulnerable to malware attacks. Meanwhile, the release of Windows 11 indicates Windows 10 is on its way out. Yet Microsoft has said it will support Windows 10 until October 14, 2025. The company typically keeps a ten-year lifespan for its products. So, you don't need to upgrade immediately. And for some businesses, it makes sense to wait longer to make the switch from 10 to 11. After all, it is not yet an essential upgrade. Those on Windows 10 will see some advantages, yes. We'll talk more about that next. But, unless you’re a heavy multitasker or need a sleeker visual design on your desktop, you can wait. By waiting, you’ll also get the advantage of others being the ones to discover the launch issues and bugs. The software has been available in beta since June. Still, as more users get access, you can expect more updates on the horizon. To help you decide if you’re ready to upgrade, you’ll first want to see if you are eligible for the free upgrade. Also, visit Microsoft's website to see if your PC can run the software (https://www.microsoft.com/en-us/windows/windows-11-specifications). If you have a custom-built desktop, you’ll want to run a health check to see if you have the TPM 2.0 Windows 11 requires. This is a specific security module, so you don’t want to overlook this! Why Upgrade to Windows 11 Windows 11 is a redesigned operating system aiming at improved user navigation. Expect:
How to Upgrade The upgrade is rolling out gradually. Those who recently purchased a new laptop before Windows 11 was pre-installed have access now. If you are an existing Windows 10 user, you'll see the Windows 11 upgrade sometime between now and mid-2022. Most users will go to Settings > Update & Security > Windows Update and click Check for Updates. If available, you'll see a Feature update to Windows 11. Click Download and install. Remember to backup all your important documents before starting the installation process! Also, don’t fall for any fake versions of Windows 11. Wait to receive an official notification of a systems update. Do not click on links promising the software on social media or via email. You could end up downloading malware. Why You Should Never Use A Free Email Address For Your Business
The message is clear: email is king. Many clients and customers choose to communicate primarily by email and as you know, it gives a fantastic ROI in your marketing strategy…unless you’re using a free email like Hotmail, Gmail, or even your internet provider. If that’s the case, you’re losing business each and every day. It looks unprofessional: Imagine if banks used free email accounts – you’d never feel comfortable giving them your personal details let alone any money. How people perceive your business is what makes your business. Without that professional touch, you’ll appear temporary and fly-by-night. It puts your credibility into question and sends the message that you’re not serious about doing business – or worse – that you’re prepared to cut corners. It erases your experience: Newer, fledgling businesses often start out with a free email address. The address clearly communicates that they are new and have little experience, and are perhaps testing the waters in a new direction. They’re not even remotely proven yet and are firmly within the hobby-zone. Continuing to use the free address once your business moves into the professional arena means you’ll struggle to build momentum and any experience will be negated. It’s forgettable or inappropriate: Your business success hinges on being memorable enough to gain referral custom and results from your advertising. Unfortunately, free email addresses are by default filled with hard to remember clutter, for example – joesplumbing_1985@hotmail.com or milkshakes_mybabby@gmail.com. Neither of these roll off the tongue, is appropriate for business, or can be remembered without a high likelihood of typos and bounce back. Branded email addresses such as joe@joesplumbing.com make running a profitable, scalable business much easier. It’s not permanent or safe: When you use a free email address you are at the mercy of the email provider. They may close down operations or cancel your account for any reason. These types of accounts are also often hacked and leaked on a global scale. When a better internet or email deal comes along, you’re still stuck using the old address because it’s printed on your business cards, car lettering and flyers. Some will agree to keep the address open for a fee, but you’ll lose the control and flexibility you need to grow your business. With your own domain name, you own it and can move it to a new business-grade email service easily. You’ll also have complete master control over the addresses within your domain, resetting passwords and creating/closing accounts at will. How Losing a Mobile Device Puts Your Entire Business at Risk
Losing a mobile phone or laptop is an experience that everyone dreads. The expense and inconvenience of buying a new device is unpleasant, but only represents a fraction of the damage done when a device is misplaced. The cost of data contained within every device can add up to many times more than the total value of the device itself. Chances are, you already use automatic login on a large variety of online services. Each of these services are vulnerable to an attacker having possession of your device. Usernames and passwords - An obvious place for an attacker to start is the likely long list of usernames and passwords saved for future use by your browser. This is often done to save time when logging into sites that you visit often. Almost universally, people opt to save login information so that they don't have to attempt to remember it every time they return. In only a short amount of time, a browser is trained to log in to your Facebook, cloud storage, and bank details just by visiting the page using your regular device. These details, called up by the browser, are saved in a single list accessible to anyone with access to the device. For an unscrupulous stranger with a found device, this list represents a goldmine of information. Simply by finding a phone misplaced in public they may gain access to a huge array of services. The problem can be made many times worse where a single password or a combination of similar passwords have been used across several accounts. In some instances, an attacker need only gain access to a single one and reuse the same stolen credentials across many sites and services. Email - Email accounts are a key target for attackers looking for access to your personal information. It is a service that many take for granted, logging in once the first time they set up the device and using automatic login every time after. It is a service that also unlocks a great deal more than just private messages. Of course, an attacker having free access to read your personal emails is bad news, but with email access a malicious user can gain access to many of the most commonly used web services online. Using the "forgotten password" button on many sites triggers a response that emails a password reset link to the email address registered on file. An attacker may use this feature to reset account passwords to one of their choosing. Doing this both grants themselves access to your account and denies you access to rescue it. Contacts - One of the best features of instant messaging is that your contacts know the messages come from you. When a message is sent from your device to someone you know it displays along with your name, details, and likely a photograph too. This can lead to identity theft, one of the biggest concerns of a lost or stolen device. With contact information already programmed in an attacker has an opportunity to impersonate you when speaking to anyone in your contacts list. Using your identity, an attacker may attempt to steal yet more details about you and your contacts. Social Media - Your social media accounts are often the face of your brand. They can be a primary way to reach out and contact customers. They are almost always the first point of contact a client has with your business. They are also extremely vulnerable to being hijacked from a stolen device. Fraudulent social media access can allow attackers to harvest both client and business data. Even without profiting directly, posting privileges can be used to cause irreversible damage to a business. Protecting your business - Services, accounts, and entire businesses can be put in great danger by something as simple as misplacing an unsecured mobile phone or laptop computer. Are You Sick of Ongoing IT Issues?
Like a persistent cough or muscle strain that won’t go away, many IT issues prove ongoing. Every time they come back you think about getting an expert’s opinion. Then, the cough fades, you can walk freely again, or your computers are back up and running. You keep on going. Until the next time. If you’re sick of ongoing issues with your IT, look to a Managed Service Provider (MSP) for help. There are many IT ailments that can negatively impact your ability to do work. Let’s consider some of the particularly common ones, and why an MSP is the right prescription. #1 Network and Internet issues. Business is done online these days. Not being able to connect to the network and slow connections are frustrating. Without the Internet, how can you do your job? You can’t even check and send emails! Let alone access team documents or enter data into cloud-based accounting software. A lagging network also slows down application and data loading time. It may only be a few moments of thumb twiddling. But add that up over several times a day and multiple by employees. You’re looking at a decrease in productivity that adds up. An MSP has the know-how to survey the IT environment for what's causing these frustrations. When there’s a problem, they’re at the ready to resolve it and help improve reliability. #2 Repeated malware infections. This can mean a couple of things. First, you don’t have effective system and application protections in place. These attacks shouldn’t be able to make it through the door in the first place. With the right firewalls, anti-spam, and protections, you should be able to keep your system on lock down. You don’t have to do this yourself. Your internal IT team has a lot to manage and monitor. Gain expert backup with an MSP reviewing your security protocols to keep the bad guys at bay. Secondly, educate employees about the dangers of social engineering. Don’t let them keep falling for the pretexts and downloading malicious files. Also, ensure passwords are strong enough to avoid adding another point of entry. #3 Printing problems. Many businesses are printing less today, but we’re not done with hard copies entirely. So, when a printer starts whirring, spinning endlessly, or can’t connect, efficiency halts. Know that printers sold at big box stores are consumer grade quality. Avoid printer frustrations with solid business-class printers (which your MSP can identify). #4 Application overload. Maybe some of your employees prefer Dropbox. Others rely on their free Gmail accounts. This hodgepodge of options can cause chaos. Staff have difficulty remembering the passwords to all of the accounts they need. So, they simplify, and that makes their accounts more hackable. Upgrading to business-grade versions of important applications is easier with an MSP. They'll help identify the software that best addresses your business needs. #5 Aging technology. You’ve had your current computers for ages. They are slower than you’d like, but you don’t have the time to look for something else. Plus, you can’t imagine having to learn something new. You’re too busy. But aging tech is more likely to fail, which could prove catastrophic if you don’t have the right systems backup. MSPs know IT. Based on your individual business needs, they can suggest a plan of attack to update the IT and keep it secure. They can also provide backup strategies to prepare for the worst and recover quickly. Basically, a managed service provider has your back when it comes to IT. Work with experts who focus on technology day in and day out. You’ll typically save money and gain time to spend innovating in your field. Gain a competitive advantage with the support of an MSP. Check Pro+Tech today! 5 Ways Managed Services Can Grow Your Business
Managed Service Providers (MSPs) help businesses take a proactive approach to managing their technology without the expensive step of hiring an in-house team. Your MSP is essentially a collection of niche technology experts working behind the scenes to keep your data safe, generate solutions to IT problems and keep your software updated. Even larger businesses who already have an IT person will often call in an MSP when daily support becomes overwhelming or a specific certification is required. Let’s explore 5 specific business breakthroughs an MSP can give you: 1. It’s extremely cost-effective: There’s only so much in the budget for IT and responding to events on a break/fix basis will quickly exhaust your accounts. An MSP works by getting ahead of problems before they occur – making equipment last longer, defending against costly security breaches and keeping the business up and running. Instead of calling for a repair at a high hourly rate, you get a wide array of expert services for one predictable monthly fee. 2. You have access to multiple experts: Businesses usually end up adding extra tasks to an unqualified but enthusiastic employee’s workload, resulting in costly problems. With MSPs, you have access to many people who are experts in very specific areas, and your existing staff can focus on tasks within their job description. 3. Speedy problem resolution: Downtime and business don’t mix, so your MSP will provide a reliable expert on call (usually with 24/7 options) to troubleshoot and resolve any problems. Much of the time, you can also skip the delay of an on-site repair with rapid remote support available in just moments. 4. Fewer problems: A large part of your MSPs service is fixing problems before they happen. While fixing things as they break isn’t the worst approach to IT management, it generally means you’re also suffering productivity losses, downtime and losing money by the second. Your MSPs primary goal is to ensure these problems are avoided completely, through system monitoring and robust security measures. They’ll also make sure every important software update and security patch is applied immediately, closing breach points and keeping your business safe. 5. Shared responsibilities: As your business grows, so will your IT systems. A good MSP is on top of what your future needs will look like and knows which products and infrastructure are suitable to help you get there. Your MSP doesn’t just monitor your system and repair as required; they share responsibility for your system. This means measuring, reporting, analyzing and optimizing, working with you to introduce new technologies and processes. Depending on your level of contracted services, your MSP can actually become a catalyst for growth. Sounds good, doesn’t it? With managed services, your business always has the maximum security against threats, downtime and productivity drops. But for the savvy business owner, it’s also a way you can afford to leverage cutting-edge technologies, with complete peace of mind and ongoing support. Boost your business with managed services. Check out our Pro+Tech!
Why Managed Services Will Save You More Than Money “Downtime costs money.” That’s no secret, but it doesn’t quite capture the whole experience…you arrive to work in the morning, grab your coffee knowing you’ve got a hectic day ahead, and are ready to dive in. For some reason your computer can’t access the database and neither can anyone else’s. You restart the server while fielding calls left, right and center, but are unable to answer any client queries. Your hands are completely tied…and now the server is beeping furiously…what’s going on??! You’re not just in crisis mode, you’re on damage control as you call every tech you can think of, trying to find one who can come NOW. Not exactly the day you had planned. The Break/Fix Days Are Gone Previously, businesses only addressed their IT needs when something broke. A few hours down meant little in the scope of things. In today’s fast world, businesses rely heavily on IT and downtime just isn’t an option. Even the legalities of simply restoring financial, legal or medical files after a breach raises issues. The cost of break/fix is now too high, both financially and emotionally. Simply put, your IT services are remotely monitored and proactively managed by a professional, external business. Your Managed Service Provider (MSP) runs regular diagnostics on equipment to identify impending failure and resolves problems before they happen. Benefits of Managed Services Small to medium businesses in particular benefit from managed services, because they don’t usually have an on-site technician to oversee the multiple systems in use. By subscribing to a managed service provider, businesses can have reduced labor costs, access to a knowledge base, future-pacing, better data security and reduced downtime. Businesses can also know exactly what their upcoming costs are and plan accordingly. Some of the managed services we can provide are: Remote support – This allows us to help you quickly without needing to be on-site. Hardware monitoring – We monitor your servers and workstations to catch hardware failures before they happen. Managed anti-virus – We make sure your anti-virus is up to date and take immediate action if an infection occurs. Patch management – We make sure your computer’s operating system is up to date, closing access to known vulnerabilities as soon as possible. Are you interested in giving a managed service a go? Check out Pro+Tech provided by us, your local Small Town Tech folks! You’ll know if you’re a victim of ransomware. Often you’re met with a red screen telling you your business files are encrypted. You won’t be able to do anything on the computer, although the cybercriminals will provide helpful instructions for how to pay up. How nice. Here’s what to do instead if you’re the victim of a ransomware attack.
Cybersecurity Ventures predicts ransomware will impact businesses every 11 seconds in 2021. Yes, you read that right. That’s up from every 14 seconds in 2019. Another research company reported ransomware increasing 485% year-over-year in 2020. Know that it’s widely considered a bad idea to pay the ransom, because you’re rewarding the cybercriminal. Plus, you can’t even be sure that they will provide the encryption key needed to regain the use of your files. What! You were going to trust the bad guys? The Important First Step The first thing you’ll want to do is make it all go away. Yet wishful thinking is not going to get the job done. Instead, you’re going to have to turn immediately to your disaster response plan, because, of course, you have one of those already. Really, don't underestimate the value of planning in advance for IT infrastructure compromise. Doing it proactively means calm, considered decisions rather than reacting in a crisis. Step one is going to be identifying the systems involved and isolating them. Once you detect a compromise, limit the spread of infection by disconnecting the devices affected. Ideally, you take only a few computers offline or disconnect an individual network. Even in a large-scale compromise, remove all affected devices from the network to contain the malware. As part of the isolation, don’t forget to disconnect any connected devices such as storage drives. The ransomware infection will even seek out USB thumb drives. Power down only the affected devices if you are unable to disconnect them from the network. Why? Because turning them off means you might lose potential evidence. Malicious actors may be monitoring your business communications. So, move offline to coordinate your response. Phone calls or text messaging will work, or personal email accounts. Don’t attempt to restore critical systems until you have identified and isolated. After that, your business can move into triage mode. Prioritize what to restore, and recover using your data backup (again, of course, you have one of those, too). Consider how critical each system is for health and safety and revenue generation. Then, get to work restoring systems in an efficient, organized fashion. Minimizing Ransomware Risk Ransomware is a major threat to every business sector, and you don’t want to become the next victim. Common best practices include:
Businesses that partner with a managed services provider have someone supporting their efforts to cut ransomware risk. Plus, if the worst happens, the MSP’s IT experts are at the ready to identify and isolate. They can find the samples needed, determine the malware strain you are dealing with, and report the attack. Your data backup should have recent copies of all information up to (or close to) the time of infection. So, once the MSP has removed all ransomware, they will wipe your systems and storage devices. They can swiftly reformat the hard disks and reinstall everything from scratch. An MSP can help you plan ahead to contain the damage from a cyberattack. Let our IT experts install best practices, set up safe backups, and track activity on your network. Sign up for Pro+Tech today! Fake Invoice Attacks Are on the Rise - Here’s How to Spot (and Beat) Them Businesses around the world are being struck with a cyber-attack that sends victims a fake invoice that looks real enough to fool to most employees. It’s an old scam that used to see bills faxed or mailed in, but it’s made its way into the digital world and instances are on the rise. Chances are you’ve already seen some of the less effective attempts, like an email advising your domain is expiring, except it’s not from your host and your domain is nowhere near expiration. These new attacks are more advanced, in that they look completely legitimate and are often from contractors/suppliers you actually use. Logos are correct, spelling and grammar are spot on, and they might even refer to actual work or invoice numbers. The sender name may also be the normal contact you’d associate with that business, or even a co-worker, as cybercriminals are able to effectively ‘spoof’ real accounts and real people. While it’s worrying that they know enough about your business to wear that disguise so well, a successful attack relies on you not knowing what to look for, or even that fakes are a possibility. With that in mind, here are two types of invoice attacks you might receive: The Payment Redirect This style of fake invoice either explicitly states payment should be made to a certain account, perhaps with a friendly note about the new details, or includes a payment link direct to the new account. Your accounts payable person believes they’re doing the right thing by resolving the invoice and unwittingly sends company money offshore. The problem usually isn’t discovered until the real invoice from the real supplier comes in or the transaction is flagged in an audit. Due to the nature of international cybercrime, it’s unlikely you’ll be able to recover the funds even if you catch it quickly. The Malware Click - Rather than go for the immediate cash grab, this style of attack asks your employee to click a link to download the invoice. The email may even look like the ones normally generated by popular accounting tools like Quickbooks or Xero, making the click seem safe. Once your employee has clicked the link, malware is downloaded that can trigger ransomware or data breaches. While an up-to-date anti-virus should block the attack at that stage, it’s not always guaranteed, especially with new and undiscovered malware. If it does get through, the malware quickly embeds itself deep into your systems, often silently lurking until detected or activated. How to Stay Safe Awareness is key to ensuring these types of attacks have no impact on your business. As always, keep your anti-virus and spam filters up to date to minimize the risk of the emails getting through in the first place. Then, consider implementing a simple set of procedures regarding payments.These could include verifying account changes with a phone call (to the number you have on record, not the one in the email), double checking invoices against work orders, appointing a single administrator to restrict access to accounts, or even two-factor authorization for payments. Simple pre-emptive checks like hovering the mouse over any links before clicking and quickly making sure it looks right can also help. Like your own business, your contractors and suppliers are extra careful with their invoicing, so if anything looks off - even in the slightest - hold back on payment/clicking until it’s been reviewed. Fake invoices attacks may be increasing, but that doesn’t mean your business will become a statistic, especially now that you know what’s going on and how you can stop them. If you're looking for a good anti-virus solution that includes local tech team on hand - try our offer!
Is Your Business Ready for Business-Grade Wi-Fi? In today’s business world, having great Wi-Fi isn’t a luxury -it’s a necessity. Businesses, with their varying needs, have personal requirements for what constitutes great Wi-Fi. For some small businesses, consumer-grade Wi-Fi may be sufficient, but many find that business-grade Wi-Fi is more appropriate. As companies grow, there becomes a tipping point where business-grade is necessary. So how do you know if your business is ready for business-grade Wi-Fi? Ask yourself the following questions to find out. How many devices use your Wi-Fi? It used to be that only desktop computers connected to your Wi-Fi, but that is no longer the case. With the rise of portable devices such as smartphones, tablets, and laptops, each person may be using your Wi-Fi from several devices. Consumer-grade hardware is designed for just a few people (like the amount that live in a single household) but can’t manage larger amounts of users and all of their devices. This is especially true for sustained usage. Remember that your employees aren’t the only people who expect to be able to connect to your Wi-Fi. One of the first things visitors typically do is look for a Wi-Fi network to connect their smartphones to. What is the size and shape of your workspace? The number of access points you will need for your Wi-Fi is dependent on the amount of physical space that needs to be covered, the shape of the area, wall material, and the number of users/devices. In smaller spaces, consumer-grade Wi-Fi is good enough. Larger, oddly shaped spaces benefit from business-grade. If your building’s walls are made of brick, cinder blocks, or cement, you likely need more access points than buildings made of other materials. Make sure you have a strong connection from all locations. It’s annoying to only be connected to Wi-Fi in certain areas of a building and find yourself in a deadzone a few steps later. Access points for business-grade Wi-Fi tend to be more powerful and flexible. For example, some business Wi-Fi systems can transfer Wi-Fi devices from a crowded access point to one that is less busy. By doing this, everybody’s fast speed remains. If you foresee your range needing to increase, such as renting out more space, it’s easier to add more access points to business-grade Wi-Fi than consumer-grade. Businesses that anticipate scaling up soon are better off with business-grade Wi-Fi. Do you want guests to have the same quality Wi-Fi as workers? In households, where consumer-grade Wi-Fi is prevalent, all users share the Wi-Fi equally. In a home environment, if children are slowing down the internet with Netflix or video games, it’s not a big problem. However, a choked business Wi-Fi can cause a lot of problems. Business-grade Wi-Fi allows you network management. You can assign a designated amount of bandwidth to different users so they’re unable to clog the entire connection. You can allow visitors internet access without giving them unlimited access to the network. How much does the internet affect your employees’ productivity? For some companies, workers only use Wi-Fi for a few quick tasks. With these types of businesses, if the internet is slow, it won’t have a big impact on how much work your employees get done. Consumer-grade Wi-Fi might be a good choice. For other companies, there isn’t much people can accomplish if the Wi-Fi isn’t working well. The slower your employees work, the less money you make. Wi-Fi troubles can also lead to frustrated, unhappy workers. If fast internet is essential for people to complete their daily tasks, business-grade Wi-Fi is important. Strong Wi-Fi is a necessity for all businesses. This is especially true for larger businesses that connect a lot of devices (from both employees and visitors) and have a big work area. Also for those where employee productivity depends on a strong connection. The goal is to keep your business-critical technology running smoothly. Consider carefully whether consumer-grade Wi-Fi or business-grade Wi-Fi is the best choice for your business. When you ask yourself the questions above, the answer should become clear. Is your business’s ready for Business-Grade Wi-Fi? Ransomware has become an undeniable threat to business growth, profitability and security. It’s a ruthless type of malware that locks your keyboard or computer to prevent you from accessing your data until you pay the ransom, which is usually demanded in untraceable Bitcoin. Cyber criminals are turning this type of attack into big business, raking in billions each year as many businesses have no choice but to pay up. How does ransomware get into the network? Surprisingly, it’s NOT those random USB drives floating around from unknown sources. That’s old school, and cyber criminals operate much more effectively now. The most common vehicle for ransomware attacks today are email and compromised websites. One email is all it takes. We’ve all become so used to email as the major form of business communication that getting someone to click a link is easier than ABC. Ransomware attacks come disguised as legitimate emails that can trick your employees into clicking through to an infected website or opening an infected attachment. Unfortunately, cyber criminals have gotten really, REALLY good at faking internal emails, external communications from stakeholders and seemingly genuine inquiries from customers. They’ll often conceal their ransomware in normal attachments like invoices and reports in Office docs as well as PDFs. Even TXT files can actually be an executable javascript in disguise! Infected websites aren’t always obvious. Let’s face it, cyber criminals will infect any web page they can get their hands on, which is why of the less reputable sites should be avoided. But it’s not just about making sure you and your employees stick to suitable sites, mainstream websites can also carry ransomware infections ready to spread to all visitors. It’s happened before – in 2016 the New York Times, BBC & MSN homepages accidentally exposed thousands of web visitors when their infected site showed malicious ads. What happens during an attack? As soon as ransomware is in the door, it immediately scans local and connected drives (including connected backups) and encrypts thousands of files. Within minutes, everything from Office files to multimedia is locked up tight, inaccessible to all users – even admin. Then a notification appears demanding a ransom to unlock the files and gives helpful instructions on how to pay it. At this point, many businesses are on hold until the situation can be resolved. Typical options include: restoring from safe, external backups; wiping the entire system and starting again; or paying the ransom and learning a hard lesson in data security. Ransomware may not be fun, but it certainly makes for an interesting day at the office! We can help you with a complete data security plan, including safe backups, virus protection, advanced firewalls and more. Find out more by visiting our Pro+Tech page. 6 Quick Security Tips to Keep Your Business Safe
Every employee shares one inescapable flaw that is putting your business at risk. They’re human. 59% of data breaches can be traced back to something an employee did (or didn’t do), which invited a cyber-attack. To lock hackers out, build security awareness and respect into your company culture, so that maintaining digital security becomes as routine as making coffee. Use complex passwords: Every employee, including management, needs to use an alphanumeric password that they haven’t used before. Password managers can assist with making sure they’re never forgotten. Verify unknown identities: Not familiar with ‘Jenny from Accounting’ who has called to ask for sensitive information? Double check caller identity and access permissions before releasing any information. Hackers love to play on our desire to be helpful. Encrypt by default: People regularly transfer data to a laptop or smartphone so they can work more efficiently. Unfortunately, this equipment can be easily stolen. Set operating systems to encrypt data by default, so that it becomes useless in the wrong hands. Protect portable devices: Laptops and mobile phones should always require a password and be set to auto-lock after a short period of time. Never leave them unattended in cars, buses, restrooms etc, and take them as carry-on luggage. Set personal usage rules: While you may have blocked productivity-vacuums such as Facebook, what are the rules regarding games, video streaming or shopping? Can they install their own software? When business computers are used for personal usage, security vigilance tends to slide, resulting in unintentional malware installation. Educate often: Digital security threats change regularly, and people become comfortable with a certain level of danger, thinking ‘it will never happen to me’. A 5-minute discussion once a month may be the barrier that keeps hackers out. Starter Topics: Links in emails – Hackers often send emails that look like they are from your bank or similar. Be sure to check the link by hovering over it with your mouse. This is known as ‘phishing’. Tech scam popups – Be on the lookout for popups advising that your computer is infected and you need to call a phone number or download software. Email attachments – Never open an unknown attachment, and even from people you know and trust, always scan for malware before opening. |
Articles
Pro+TipsWe aim to provide helpful and easy to understand tech articles. |