Are you owning, securing and protecting your data?
Have you been doing everything you can to #OwnIT, #SecureIT and #ProtectIT at your business and in your personal life? It is easy to revert to bad habits and shortcuts when we are busy or tired of forgetting passwords and other security requirements.
Think of IT (including your systems and data) like a car that is running low on oil and is due for a tune-up. Sure, you could add more oil because you are in a rush and don’t “have time” to go get an il change and routine service, BUT in time you could end up destroying your vehicle if you continue to not properly care for it. On the other hand, if you take your care for its service check, your mechanic will also give you a multi-point inspection allowing you to take action before your car has an expensive breakdown. Your IT systems are much the same, regular check-ups and inspection are key to keeping things running smoothly and safe from cybersecurity threats.
We are here to help you understand how you can Own IT. Secure IT. and Protect IT. for your business. Watch for regular updates from us this month, sharing cybersecurity tips and best practices that you can use to keep your data and information safe.
Did you know that hacked passwords cause 81 percent* of data breaches? Today, it is more important than ever before to protect information and data critical to your business. Are you and your employees doing everything you can to #SecureIT and protect your business?
Ever feel like your devices are listening to you? There is some truth to the fear, but the real risk is not in targeted advertising, but in what information you allow to be shared with app developers, social media platforms and the public.
In the age of social media and connected apps for literally everything, what you share and who you share it with on the many platforms can make or break your business and career. Here are three tips to help you #OwnIT on social media:
- Check your privacy settings. Who can see your social media pages? Do you limit items to just friends or are your pages public? It is also important to be careful about what you share, if you wouldn’t want your grandmother to see it, keep it off of the web.
- Pay attention to permissions. FaceApp (the Russian face aging app) is just the latest to induce mass panic when people realized their photos had been permanently been uploaded to the app’s server. Be selective when agreeing to install apps (and grant permissions) on your devices. If an app wants access to sensitive data on your phone, be sure it is one you can trust.
- Delete unused apps. Remember that trending app from four months ago? No? Me either. Delete unused apps from your devices to prevent inadvertent sharing.
With all of the digital devices used personally and in business today there are countless opportunities for hackers to access data. Earlier this month, we shared how to #SecureIT with strong passwords. But, to be truly cyber smart, securing your data is only part of the equation — you also need to #ProtectIT
Think of the data you store at your business like a safety deposit vault at your bank. Each customer has a key to their box. Beyond that, is the thick vault door and often, security officers to protect the vault and everything and everyone else in the bank. It would be easy to break into the simple lock box, but very few criminals can get through the vault door and security. Client and staff passwords are like the lock box, while layers of data protection are like the vault door and security officers.
Here are a few key things that every business should do to #ProtectIT:
- Build and maintain a strong firewall. Keep your users away from dangerous usage and intrusion by hackers. Your firewall is the first line of defense against cyber threats.
- Secure WiFi networks. Restrict who is allowed on your wireless networks. If you allow guests on your network, keep their connection private from your own. If you access guest networks when out and about, consider extra internal security on your devices to protect data.
- Keep your tech current. There is nothing that hackers like more than outdated software and systems that they already know how to sneak into. Be sure to frequently update your tech infrastructure and antivirus software.
- Backup, backup, backup. Ensure you have a system in place that includes off-site backups of your data both online and offline.
Your path to #ProtectIT starts with an evaluation of what you are presently doing. We can help, give us a call or send us a message to review current efforts.