Cyber Security Tip: DON’T use public WiFi until you read this

Cyber Security Tip: DON’T use public WiFi until you read this

We’re all guilty of it: connecting to free public WiFi. Whether it’s at the coffee shop, hotel or airport, the temptation to check e-mail and surf the web is just too strong to resist. So, BEFORE you connect to any free, public WiFi, make sure the connection is legitimate.

It’s not uncommon for hackers to set up fake clones of public WiFi access points to try to get you to connect to their fake WiFi account over the legitimate, safe public one being made available to you.

Further, you’re connected with everyone else logged in – kind of like a public restroom with no stalls. Just a row of toilets where everyone can see you. Think of this picture every time you consider hopping on public WiFi.

The BEST option is to use your phone as a hot spot or carry your own WiFi device.

And if you just have to connect, at least don’t log in to critical accounts (like your bank account) or shop online, where you’d be entering credit card credentials.

Have questions about cyber security or some other IT-related issues? Book Now to book a quick, 10-minute session, or call 480-999-5468 to speak to someone now.

Cyber Security Tip: The DANGERS of Dropbox and other file sync apps

Cyber Security Tip: The DANGERS of Dropbox and other file sync apps

If you’re using a personal Box, Dropbox, OneDrive, Google Drive or other consumer-grade file sync and sharing cloud applications, listen up! These applications pose a huge threat to your company because company data can be spread far and wide without central oversight of what information is being shared with whom.

This is even MORE important if your company has access to and/or stores financial, medical or other sensitive data. Using personal (not company-approved) file-sharing applications like these are a clear and direct violation of data breach and compliance laws. Bottom line: DON’T USE THEM FOR COMPANY DATA and use only company-approved, business-grade file-sharing applications.

One last note here. Ask around. Make sure the rest of your company isn’t using this type of storage as well.

Want us to take a look? We can check all the devices in your environment for you. Just let us know.

Have questions about cyber security or some other IT-related issues? Book Now to book a quick, 10-minute session, or call 480-999-5468 to speak to someone now.

Cyber Security Tip: What to do if you lose your laptop (or other device)

Cyber Security Tip: What to do if you lose your laptop (or other device)

So, you’re in the car on the way home from Starbucks, basking in the glow of consuming your triple-shot, low-foam, extra-hot pumpkin-spice latte, when you suddenly realize your laptop has gone missing. You drive back like the caffeinated lunatic you are, only to discover no one has turned it in. What do you do? That depends on what precautions you have (or haven’t!) taken.

First, if you’ve properly encrypted your data, password-protected the access to your device and shut down and logged off all key applications, you’ve got a bit more time to respond. But the first thing to do, whether or not you’ve taken those precautionary measures, is to notify your IT department (us) that you’ve lost your device. That will allow us to change passwords and lock access to applications and data a thief may gain access to via your unprotected laptop. We can also remotely wipe your device to make sure no one will be able to gain access to the data stored on your computer. (Which is also why it’s CRITICAL to back up your data on a daily basis!)

Next, change ALL the passwords to every website you log in to, starting with any sites that contain financial data (your bank account) or company data. If your laptop contained medical records, financial information or other sensitive data (like social security numbers, birthdays, etc.), then you need to contact a qualified attorney to understand what you may be required to do by law to notify individuals who may be affected. Quite simply, an ounce of prevention is worth a pound of cure, so make sure you’re engaging us to encrypt and back up your data, as well as put remote monitoring software on all mobile devices. Set a pin-code lock or password requirement to access a device after 10 minutes of inactivity and get into the habit of logging out of websites when you’re done using them.

Have questions about cyber security or some other IT-related issues? Book Now to book a quick, 10-minute session, or call 480-999-5468 to speak to someone now.

Cyber Security Tip: REMOVE these from your laptop, tablet or smartphone

Cyber Security Tip: REMOVE these from your laptop, tablet or smartphone

Like it or not, device manufacturers LOVE to fill your brand-new PC, tablet or phone full of “free” applications like games, music and photo apps and more (manufacturers actually get paid to install these with the devices they sell).

But outdated apps are a breeding ground for vulnerabilities, so if you’re not using a particular application on a regular basis, it’s best to REMOVE it completely. This is also why we source and set up all workstations and PCs for our clients – we actually remove the junk and configure the security setup so it’s ready to go.

If you haven’t done so, go through your phone, laptop and other devices and uninstall applications you’re not using. Need help? Give us a call 480-999-5468

Have questions about cyber security or some other IT-related issues? Book Now to book a quick, 10-minute session, or call 480-999-5468 to speak to someone now.