p(29 to 34)
Don’t do This on your work laptop or PC
The Only thing you should use your company’s workstation or PC for is…Work! Never mix personal web surfing and social media with company devices. If you want to check your Hotmail account or Facebook page, do it during your lunch break and on Your personal device.
Over 100,000 Facebook accounts are hacked every day. If you’re using a company device to access a compromised account, you’re opening up a door to a hacker who can then get into your company’s network via your e-mail or PC. Bottom line: don’t use company PCs, devices, phones or Internet for Personal use.
One final note: make sure you set up multifactor authentication on your personal accounts. This will help reduce the chance of an attacker breaking into your social media account or your personal e-mail and using it to phish other people in your organization.
Have questions about cyber security or some other IT-related issues?
Visit our website at WWW.IT management solutions.com and book your discovery call today
"Don't forget to like, subscribe, and share your thoughts in the comments – your support keeps our community thriving. Until next time, stay active and stay inspired!"
Do it for your clients even if you don’t feel it’s necessary
Privacy and security are important to your organization, but they’re even more important to those whom you serve. Nearly 75% of Americans feel it is “extremely” or “very” important that the companies they work with keep their information under lock and key and the companies have easy-to-understand explanations of what information is shared with whom and how it is shared.
If you collect it, protect it! Follow all reasonable measures to protect every piece of information you have about your client or customer. Have policies enforced that prohibit unauthorized access to those who do not have a need to see it.
Be open about how you use information that your clients give you. Clearly communicate any practices and processes, and use this as an opportunity to set your company apart by showing you’ve gone deeper than competitors by performing annual risk assessments.
Help create a culture of privacy in your office. Everyone should be educated about their role in privacy, security and respecting and protecting the private information of clients, colleagues and partner vendors.
Have questions about cyber security or some other IT-related issues?
Visit our website at WWW.IT management solutions.com and book your discovery call today
"Don't forget to like, subscribe, and share your thoughts in the comments – your support keeps our community thriving. Until next time, stay active and stay inspired!"
Set up bank alerts – Now!
Here’s a tip that just might save your bacon: set up withdrawal alerts on your bank accounts. Many banks will send you an e-mail alert whenever money is withdrawn from your account via check, debit card or transfer. Setting up those alerts will allow you to spot and report fraudulent activity Before the money has already been siphoned into a cybercriminal’s hands.
Second, require dual-factor authentication to access your bank account. Most banks will have this as a security setting for your account. That simply means when you try to log in, you will be asked to enter a four- or five-digit code sent to your mobile phone or personal e-mail. This will prevent a hacker from getting in Even If they crack your password.
Remember: cybercrime is at an all-time high, and hackers are setting their sights on small and medium businesses that are “low-hanging fruit.” Don’t be their next victim!
Have questions about cyber security or some other IT-related issues?
Visit our website at WWW.IT management solutions.com and book your discovery call today
"Don't forget to like, subscribe, and share your thoughts in the comments – your support keeps our community thriving. Until next time, stay active and stay inspired!"
Who are you *really*?
This is annoying but SUPER important
Multifactor authentication (MFA for short), sometimes called two-factor authentication (2FA), is a system in which you must verify your identity in two separate ways to access an account – this may be a login password, an online account or an account to access an application. Sound annoying? It’s not that bad. Here’s an example:
After enabling MFA on a Gmail account, each time you log in, you’ll have to input your password. You then get asked to enter a six-digit code that is unique to you and changes every 20 seconds. You get this code from an app on your phone, a jump-drive-sized key fob or a program on your computer. In the above example, you use a smartphone app (there’s one for every type of device, and one app will handle the MFA codes for each individual account) and input the code. Only then do you have access to your account. You must enter both password and 2FA code each time you access the account. If someone steals your password, they still can’t access your Gmail account.
If you aren’t currently using multifactor authentication with your most sensitive data and systems, investigate if it’s an option today. The extra 15 seconds to pull up the code and get logged in is laughably short compared to the time spent dealing with a hacked account.
Have questions about cyber security or some other IT-related issues?
Visit our website at WWW.IT management solutions.com and book your discovery call today
"Don't forget to like, subscribe, and share your thoughts in the comments – your support keeps our community thriving. Until next time, stay active and stay inspired!"
Make This account more secure than everything else
Using complicated passwords for everything IS annoying. However, the one account you want to make sure has a VERY complicated, long, hard-to-type password is your e-mail account.
Why is your e-mail account so important? First, this is a direct gateway to all your employees, clients, friends and associates. Now a hacker can use your e-mail to steal from all of them.
Second, your e-mail is used to reset passwords on everything. Bank accounts, financial software, CRMs, etc.
Hackers even rummage through all your contacts, appointments and notes you store in your Outlook. Think about all the information they’d get access to!
Have questions about cyber security or some other IT-related issues?
Visit our website at WWW.IT management solutions.com and book your discovery call today
"Don't forget to like, subscribe, and share your thoughts in the comments – your support keeps our community thriving. Until next time, stay active and stay inspired!"
Comments
Post a Comment