Our dependence on the Internet of Things (IoT) is greater than it ever has been before – but so is the threat of cyber crime. While having our data and operations is essential for efficiency, productivity and customer satisfaction, it leaves companies vulnerable to attack.
Given that these two realities exist simultaneously, it is imperative that organizations learn to discourage and thwart the hackers as much as possible. These days, the cyber criminals are looking for the quick and easy score. So much like the burglar who will avoid homes with security systems or large dogs, you want to make your business look like it is too much trouble to mess with. Here are some of Alliance IT’s top suggestions for protecting your network.
- Update Regularly: Many malware attacks exploit vulnerabilities in old or outdated software. The OS patches and upgrades provided to you by the software manufacturer should be applied as they come out, automatically if possible. You may also wish to get rid of notoriously vulnerable software such as Java and Flash, which are known to cause security issues.
- Make Sure the Basics are in Place: Every organization and business should have an up-to-date anti-virus / malware product protecting their data, and a firewall should be in place. Check your OS to see if the firewall was incorporated, otherwise inquire as to the best business grade firewall. If you have questions regarding the best anti-virus products for businesses, ask the experts at a local Sarasota managed services IT firm.
- Be Mindful of WiFi: Do not use open wifi for your business data, as it is too easy for criminals to hack into these networks. Make sure you have an up-to-date router, as older routers may have outdated security, and insist on encrypted passcodes and strict password protocols.
- Lock Down Your Phones: Because they have become so commonplace, we often forget that our phones (your employee’s phone) are essentially powerful mobile computers. Just like our desktops and laptops, they often have easy, saved access to work related programs, and a lost or hacked phone gives a criminal easy access if not properly protected. Be sure to use all security features, quick timeouts, and VPNs to secure the access on a phone.
- Understand the Cloud: Although secure, your data on the cloud is out of your control. Therefore, you may wish to keep your most sensitive data off the cloud. If you are looking for redundancy or remote backup, this can be achieved in other ways, such as outsourcing.
- Trick the Security Questions: With all the information which is online and readily seen on social media, traditional security questions can be easily answered by crooks. Choose a word that has nothing to do with the answer – such as answering “three” to “what town were you born in?” – but just make sure to come up with a plan of action which you will remember when you yourself need to access the security questions.
- Practice Safe Email Procedures: Most business people now understand that a stranger is not giving them millions of dollars, but the email phishing scam artists have gotten smarter. Train your employees on how to best deal with links they receive over email – for instance, to look for awkward sentence structure, verify the sender, hover over the link (not clicking) to ensure that the URL is familiar. (Read more on how to protect your company from email scams)
The statistics are sobering – with 60% of small to medium sized businesses reporting cyber attack incidents in recent years, it is clear that these organizations must take the threat seriously. The experts at Alliance IT are here to help you to navigate through the difficulties and best protect your data – call us today for a technology / business assessment to get started.