IBM-illustration_security_rc

Security awareness plan for every business (even yours!)

Posted on Posted in Technology
Change passwords regularly

If you have one key password or several, change them every couple of months or at least quarterly. Use Microsoft’s Password Strength Checker (https://www.microsoft.com/security/pc-security/password-checker.aspx) to determine the strength of your password, and don’t forget to use lower case letters, capital letters, and symbols – and preferably 10 or more characters. Don’t use any information that other people could figure out about you, such as, the names of significant others, kids, pets, or streets. And if you have so many passwords that you cannot remember them all, consider using a cloud-based password manager program. Check out reviews online before downloading or purchasing.

 

Think twice before clicking on abbreviated links

Abbreviated links may be synonymous with social media, but don’t click on any short links before seeing the link it its entirety first. Here are two options to convert an abbreviated link back to its full link: http://checkshorturl.com and http://urlxray.com. Here’s an example of what can happen if you don’t check out a link before clicking: a co-worker clicked on a link she thought was sent by a reputable person, but the abbreviated link led her straight to a contaminated site, and before she knew it, her computer had been compromised, and her hard drive had to be reformatted. Her IT admin was not happy, but at least, the entire network was not affected. Learn from this person’s mistake – and don’t let it happen to you or your business.

 

Encrypt and password-protect important files

Do you have important spreadsheets on your computer: anything from a list of passwords to a confidential customer list? No matter what important files you may have, consider password-protecting them. Pros use encryption tools like VeraCrypt (https://veracrypt.codeplex.com) to create secure encrypted containers for their confidential stuff. This will add a layer of protection to the information in the event that a breach happens – and be realistic, a breach will happen eventually.

 

Virus protection

You’re On Windows? Or Android? Use virus protection. Always allow auto-updates. For an additional layer of security, consider Malwarebytes Anti-Malware. (http://www.malwarebytes.org) It’s always good to have a second opinion of a file’s security. Good news for iPhone & Mac/Linux users: You may neglect this point. Your systems are almost immune to such infections.

 

Back up. Really. Do it.

There are people who swear that they have no need to back up their systems. With electrical surges, storms, tsunamis, earthquakes, etc., who wouldn’t agree that it’s better to be prepared than to have to re-create all your digital assets? Robberies, theft, and defects happen, too. What about your photos, illustrations, documents? Today, most of us keep these on our computers, laptops, tablets, and smartphones. If your system got corrupted, how would you recreate those photos and images? How would a business recreate its archives containing years of product images? So, once a week, or even more often, back up your entire system. Even if you’re not a system admin, add the back up to your smartphone or other mobile device calendar.
 
If you follow these practices on a regular basis you’ll be one step ahead of the cyber criminals who want access to your data or to turn your system into a tool for cybercrime.

Leave a Reply

Your email address will not be published. Required fields are marked *