Cyber Security is crucial for any business. Hackers, viruses, and other dangerous applications are always active threats to your company’s sensitive information and productivity. According to Verizon’s 2018 Data Breach Investigations Report (DBIR), 58% of data breach victims are categorized as small businesses. We’ve gathered safety tips that, combined with professional Managed Security Services and an Advanced Firewall, should keep your business up and running.
“The use of default or easily guessable passwords is as en
vogue as tight rolling your jeans. Stop it—in fact passwords
regardless of length or complexity are not sufficient on their
own. No matter who administers your POS environment
(whether in-house or outsourced) they should be required to
use two-factor authentication.” Verizon DBIR 2018
It’s time to stop putting passwords on Post-It notes! Password security is one of the first lines on defense for your IT infrastructure. You can have the best firewall, anti-virus, and DDoS protection available, but weak password security will render your information vulnerable. Have strong, complex passwords with numbers, mixed case letters, and symbols. Two Factor Authentication, verifying your identity with more than just a password, is quickly becoming a standard in cyber security. It might take a little longer to access your information, but optimal password security is an excellent defense against data breaches.
“Both phishing attacks and miscellaneous errors begin with
your staff. Make sure that you conduct regular security training
to lessen the effectiveness the former and have routine
security audits to protect against the latter.” Verizon DBIR 2018
One of the most common ways that data can be breached is my user error when it comes to E-mail Phishing. Attacks are becoming more and more sophisticated to the point where a phishing scam can resemble an E-mail from a client or fellow employee. First, always double check the recipient’s E-mail address. Just because the name may be someone that you know doesn’t mean it is their correct address. Second, always truly look over the E-mail that you have receive. Small hints may reveal it is an automated scam such as spelling mistakes, not addressing you by name, or lack of a signature below their message. If you do receive an E-mail scam, contact your IT service provider immediately. You never know who else in your office received a similar attack.
“Keep highly sensitive and secret data separated from the rest
of your network. Restrict access to it to only those individuals
who absolutely require it to do their jobs. Even then, monitor
that access routinely to make sure the data is not being
copied, moved or accessed in a suspicious manner. Verizon DBIR 2018
Proper tiers of security are integral to protecting your data from breaches. Different types of information, like financial information, may not be relevant to certain positions in your organization. Those positions who require sensitive information on a daily basis should keep tabs on who is accessing that information an how often.
DATA BREACHES CAN HAPPEN TO BUSINESSES OF ANY SIZE
CALL 718-967-7000 NOW FOR A NETWORK ASSESSMENT
If your company is like many organizations, your IT infrastructure progressed over time, trying to keep up with the pace of your business. Without the right kind of IT planning and careful technology management all along, your technical environment probably has gaps.
Our IT assessments provide a clear picture of your current IT infrastructure and operations. Whether faced with budget shortfalls, limited resources, aging infrastructure or an outdated strategy, our detailed assessment reports provide relevant findings and recommendations to spur meaningful organizational change.
NetConnect provides comprehensive assessments of both IT infrastructure and IT operations. Our IT infrastructure assessments evaluate all major infrastructure components, including servers, storage networks, security, desktop infrastructure, end-device hardware and applications. Our IT operations assessments evaluate critical operational areas, such as IT strategic planning, IT staffing, IT operational processes, IT governance, IT vendor management and IT support.
Get a Free Copy of the 2019 SonicWall Cyber Threat Report!