Cyber Security Tip: The #1 threat to your security is…

Cyber Security Tip: The #1 threat to your security is…

YOU! And your employees. Like it or not, human beings are our own worst enemies online, inviting hackers, viruses, data breaches, data loss, etc., through the seemingly innocent actions taken every day online. In most cases, this is done without malicious intent – but if you as a manager or owner aren’t monitoring what websites your employees are visiting, what files they’re sending and receiving, and even what they’re posting in company e-mail, you could be opening yourself up to a world of hurt.

That’s because employees’ actions can subject the company they work for to monetary loss, civil lawsuits, data theft and even criminal charges if they involve disclosure of confidential client/patient information.

Two things you can do: One, create an Acceptable Use Policy (AUP) to outline what employees can and cannot do with work devices, e-mail, data and Internet. That way they know how to play safe. Second, implement ongoing training (like these tips!) to keep security top of mind. We can also run phishing security tests and score your employees. That will truly show if they know how to spot a suspicious e-mail and will make them realize how easy it is to be duped.

If you need help with setting up an AUP or employee training, give us a call at 480-999-5468

Have questions about cyber security or some other IT-related issues? Book Now to book a quick, 15-minute session, or call 480-999-5468 to speak to someone now.

Cyber Security Tip: 3 essential rules for all cloud applications

Cyber Security Tip: 3 essential rules for all cloud applications

If you’re using any kind of cloud application (and these days, who isn’t?), you are right to be concerned about data privacy and security. The company hosting your data is ultimately responsible for keeping hackers out of THEIR network, but most cloud breaches are due to USER ERROR. So, it’s important that you, the user, are being smart about security. Here are a few things you can easily do to improve security in the cloud:

1. Set up multifactor authentication AND maintain a STRONG password of at least eight characters with both uppercase and lowercase letters, as well as numbers and symbols. Do NOT make it easy, such as “Password123!” While that technically meets the requirements, a hacker could easily crack it.

2. Make sure the device you’re using to access the application is secure. This is an area where you need professional help in installing and maintaining an advanced security stack that goes way beyond a strong firewall, antivirus and spam-filtering software. Don’t access your cloud application with a device you also use to check social media sites and free e-mail accounts like Hotmail.

3. Back up your data. If the data in a cloud application is important, make sure you’re downloading it from the application and backing it up in another safe and secure location. That way, if your account is hacked, if the data is corrupted OR if the cloud company shuts down your account, you have a copy.

Have questions about cyber security or some other IT-related issues? Book Now to book a quick, 15-minute session, or call 480-999-5468 to speak to someone now.

Cyber Security Tip: You clicked a link by mistake. Now what?

Cyber Security Tip: You clicked a link by mistake. Now what?

No matter how diligent you are about security, there’s always a chance you can get fooled into clicking a malicious link or opening an untrusted document. That’s why you need to put a plan in place NOW to protect yourself and your CLIENTS, so damage is minimized.

But what should you do when you click THAT link by mistake?

Don’t assume you’re fine because nothing happened. Hackers have intentionally designed their attacks so that you don’t know anything has changed. You might not think anything was accessed or downloaded, but that may not be the case.

Hackers often hide for months in a network, not making any “moves.” Why? They want to find out as much as they can about their victim, like how much money you have to pay a ransom or what type of data you have that they might want to sell.

What do you do? Contact your IT department (us) IMMEDIATELY. The faster we can address the threat, the better your chances are of preventing much bigger problems. We’ll go to work on conducting a full scan of your network and/or taking the appropriate actions to protect you.

Have questions about cyber security or some other IT-related issues? Book Now to book a quick, 15-minute session, or call 480-999-5468 to speak to someone now.

Cyber Security Tip: Do you process credit cards? READ THIS NOW

Cyber Security Tip: Do you process credit cards? READ THIS NOW

If you handle, process or store credit cards in any manner, you are required to comply with PCI DSS, or Payment Card Industry Data Security Standards. This is a set of LEGAL requirements you must abide by to maintain a secure environment. If you violate them, you will incur serious fines and fees.

Even if you don’t process many credit cards, you’re subject to these laws, and thinking you don’t process enough to matter or that “no one would care” is 100% wrong.

All it takes is an employee writing down a credit card number in an e-mail for you to get caught and face penalties and fines.

Getting compliant – or finding out if you ARE compliant – isn’t a simple matter I can outline in a 1-2-3-step checklist. It requires an assessment of your specific environment and how you handle credit card information.

If you’d like our assistance, give us a call to review how you are processing, handling and storing credit cards – the quick assessment is free to you!

Have questions about cyber security or some other IT-related issues? Book Now to book a quick, 15-minute session, or call 480-999-5468 to speak to someone now.