{"id":178,"date":"2014-05-01T16:54:00","date_gmt":"2014-05-01T16:54:00","guid":{"rendered":"https:\/\/ntegrait.com\/how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take.html"},"modified":"2014-05-01T16:54:00","modified_gmt":"2014-05-01T16:54:00","slug":"how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take\/","title":{"rendered":"How To Protect Your Business From Today\u2019s Pervasive Cyber Threats\u2014 6 Easy Steps To Take."},"content":{"rendered":"

\"CyberDid you know that\u2014?<\/p>\n

If your small business has a weak security system, it will be targeted in attacks aimed at larger corporations?<\/strong><\/p>\n

The threat of cyber criminals accessing your confidential business data and your money is more real today than ever before.<\/strong><\/p>\n

The U.S. House Committee on Small Business reports that:<\/p>\n

\u201cSmall businesses generally have fewer resources available to monitor and combat cyber threats, making them easy targets for expert criminals. In addition, many of these firms have a false sense of security and believe they are immune from a possible cyber-attack.\u201d<\/strong><\/p>\n

The U.S. government also believes that state-sponsored cyber attacks and espionage will continue to grow. \u00a0<\/strong><\/p>\n

Don\u2019t lull yourself into a false sense of security.\u00a0 Take action before the criminals do:<\/strong><\/p>\n

1. Educate your employees, and develop a written security policy for your business.\u00a0 <\/strong>Educate your employees about the real possibility of cyber attacks.\u00a0 Include information about the threats of opening emails or clicking on suspicious links. They should also be cautious about downloading apps on mobile devices they use for business. Stay current about the latest, security issues (contact {company} and we can help}, and update your policy as needed. You should also create a contingency plan if business data is compromised, or if your employees\u2019 personal computer devices containing business information are lost or stolen.<\/p>\n

2. Use strong passwords and change them regularly.<\/strong>
\nDon\u2019t use common ones like:<\/p>\n

\u201c123456\u2033 \u201cqwerty,\u201d \u201cwelcome,\u201d \u201cninja,\u201d and \u201cabc123\u2033<\/p>\n

Use difficult-to-decipher passwords.\u00a0 Try using words spelled backwards, and throw in a random special symbol or number. Also, use different passwords on all your accounts. Stay a step ahead of the hackers with difficult-to-crack, and numerous passwords.<\/p>\n

3. Encrypt, encrypt, encrypt.<\/strong>
\nEncrypt your data to ensure it is safe. In this case it will be safe even if it\u2019s contained on a lost portable device.\u00a0 \u00a0Also make use of encryption software that scrambles data so it\u2019s unreadable by cyber criminals.\u00a0 \u00a0Check out Windows BitLocker Drive Encryption (http:\/\/windows.microsoft.com\/en-US\/windows7\/products\/features\/bitlocker<\/a>), or FileVault for your Macs (http:\/\/support.apple.com\/kb\/HT4790<\/a>).<\/p>\n

\u00a04. Do you know what\u2019s on your network?\u00a0 You might be surprised.<\/strong>
\nYou need to know what\u2019s going on inside your network. If you notice any strange activity, call {company} before your data is compromised. Only a true security expert can protect you in this case.<\/p>\n

5. Ensure you and your employees safeguard devices when traveling.<\/strong>\u00a0<\/strong>
\nDid you know that in high-risk countries like China, Russia or Iran, computers are often physically searched when you\u2019re out of your hotel room? \u00a0Be sure to keep your computing devices with you at all times. Avoid bringing your smartphone to these countries as well. They may be spied on when you use them.\u00a0 It might even be a good idea to use a separate computer just for travel purposes that doesn\u2019t contain any confidential information. Also be sure to wipe it clean when you return home before connecting it to your networks, just in case you picked up a nasty virus!<\/p>\n

6. <\/strong>Use multifactor authentication to log into your bank\u2019s website.<\/strong>
\nThis means that to access your business (or personal) account you would need some other form of identification (such as a code sent via text to your smartphone). \u00a0This makes it more difficult for a thief to access your account.\u00a0 Did you know that the<\/p>\n

FDIC (U.S. Federal Deposit Insurance Corporation) recommends that you actually use a separate computer for online banking? This way you won\u2019t accidentally download malware from email phishing links that record your keystrokes.<\/p>\n

This is just the beginning of what you can do to protect your business from cyber thieves.\u00a0 For more in-depth information and precautions you should take, contact us by phone or email.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"

Did you know that\u2014? If your small business has a weak security system, it will be targeted in attacks aimed at larger corporations? The threat of cyber criminals accessing your confidential business data and your money is more real today than ever before. The U.S. House Committee on Small Business reports that: \u201cSmall businesses generally…<\/p>\n","protected":false},"author":5,"featured_media":179,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[53],"tags":[],"class_list":["post-178","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-techtips"],"acf":[],"yoast_head":"\nHow To Protect Your Business From Today\u2019s Pervasive Cyber Threats\u2014 6 Easy Steps To Take. - IT Services in Virginia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ntegrait.com\/how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How To Protect Your Business From Today\u2019s Pervasive Cyber Threats\u2014 6 Easy Steps To Take. - IT Services in Virginia\" \/>\n<meta property=\"og:description\" content=\"Did you know that\u2014? If your small business has a weak security system, it will be targeted in attacks aimed at larger corporations? The threat of cyber criminals accessing your confidential business data and your money is more real today than ever before. The U.S. House Committee on Small Business reports that: \u201cSmall businesses generally…\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ntegrait.com\/how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take\/\" \/>\n<meta property=\"og:site_name\" content=\"IT Services in Virginia\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-01T16:54:00+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/blogfeed.ulistic-projects.com\/wp-content\/uploads\/2014\/05\/450136729.jpg\" \/>\n<meta name=\"author\" content=\"Steve West\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve West\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ntegrait.com\/how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take\/\",\"url\":\"https:\/\/www.ntegrait.com\/how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take\/\",\"name\":\"How To Protect Your Business From Today\u2019s Pervasive Cyber Threats\u2014 6 Easy Steps To Take. - IT Services in Virginia\",\"isPartOf\":{\"@id\":\"https:\/\/www.ntegrait.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ntegrait.com\/how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ntegrait.com\/how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ntegrait.com\/wp-content\/uploads\/2014\/05\/450136729.jpg\",\"datePublished\":\"2014-05-01T16:54:00+00:00\",\"dateModified\":\"2014-05-01T16:54:00+00:00\",\"author\":{\"@id\":\"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.ntegrait.com\/how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ntegrait.com\/how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ntegrait.com\/how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take\/#primaryimage\",\"url\":\"https:\/\/ntegrait.com\/wp-content\/uploads\/2014\/05\/450136729.jpg\",\"contentUrl\":\"https:\/\/ntegrait.com\/wp-content\/uploads\/2014\/05\/450136729.jpg\",\"width\":414,\"height\":414},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ntegrait.com\/how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ntegrait.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How To Protect Your Business From Today\u2019s Pervasive Cyber Threats\u2014 6 Easy Steps To Take.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ntegrait.com\/#website\",\"url\":\"https:\/\/www.ntegrait.com\/\",\"name\":\"IT Services in Virginia\",\"description\":\"Ntegra IT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ntegrait.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79\",\"name\":\"Steve West\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ntegrait.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g\",\"caption\":\"Steve West\"},\"description\":\"Ntegra IT is devoted to providing reliable Computer Support to businesses that want to improve productivity and profitability. We deliver custom designed Network Services that better map to your business, so you can stop worrying about your technology and get back to achieving your business goals.\",\"url\":\"https:\/\/ntegrait.com\/author\/swestntegrait-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How To Protect Your Business From Today\u2019s Pervasive Cyber Threats\u2014 6 Easy Steps To Take. - IT Services in Virginia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ntegrait.com\/how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take\/","og_locale":"en_US","og_type":"article","og_title":"How To Protect Your Business From Today\u2019s Pervasive Cyber Threats\u2014 6 Easy Steps To Take. - IT Services in Virginia","og_description":"Did you know that\u2014? If your small business has a weak security system, it will be targeted in attacks aimed at larger corporations? The threat of cyber criminals accessing your confidential business data and your money is more real today than ever before. The U.S. House Committee on Small Business reports that: \u201cSmall businesses generally…","og_url":"https:\/\/www.ntegrait.com\/how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take\/","og_site_name":"IT Services in Virginia","article_published_time":"2014-05-01T16:54:00+00:00","og_image":[{"url":"http:\/\/blogfeed.ulistic-projects.com\/wp-content\/uploads\/2014\/05\/450136729.jpg","type":"","width":"","height":""}],"author":"Steve West","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Steve West","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ntegrait.com\/how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take\/","url":"https:\/\/www.ntegrait.com\/how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take\/","name":"How To Protect Your Business From Today\u2019s Pervasive Cyber Threats\u2014 6 Easy Steps To Take. - IT Services in Virginia","isPartOf":{"@id":"https:\/\/www.ntegrait.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ntegrait.com\/how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take\/#primaryimage"},"image":{"@id":"https:\/\/www.ntegrait.com\/how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take\/#primaryimage"},"thumbnailUrl":"https:\/\/ntegrait.com\/wp-content\/uploads\/2014\/05\/450136729.jpg","datePublished":"2014-05-01T16:54:00+00:00","dateModified":"2014-05-01T16:54:00+00:00","author":{"@id":"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79"},"breadcrumb":{"@id":"https:\/\/www.ntegrait.com\/how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ntegrait.com\/how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ntegrait.com\/how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take\/#primaryimage","url":"https:\/\/ntegrait.com\/wp-content\/uploads\/2014\/05\/450136729.jpg","contentUrl":"https:\/\/ntegrait.com\/wp-content\/uploads\/2014\/05\/450136729.jpg","width":414,"height":414},{"@type":"BreadcrumbList","@id":"https:\/\/www.ntegrait.com\/how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ntegrait.com\/"},{"@type":"ListItem","position":2,"name":"How To Protect Your Business From Today\u2019s Pervasive Cyber Threats\u2014 6 Easy Steps To Take."}]},{"@type":"WebSite","@id":"https:\/\/www.ntegrait.com\/#website","url":"https:\/\/www.ntegrait.com\/","name":"IT Services in Virginia","description":"Ntegra IT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ntegrait.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79","name":"Steve West","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ntegrait.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g","caption":"Steve West"},"description":"Ntegra IT is devoted to providing reliable Computer Support to businesses that want to improve productivity and profitability. We deliver custom designed Network Services that better map to your business, so you can stop worrying about your technology and get back to achieving your business goals.","url":"https:\/\/ntegrait.com\/author\/swestntegrait-com\/"}]}},"_links":{"self":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts\/178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/comments?post=178"}],"version-history":[{"count":0,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts\/178\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/media\/179"}],"wp:attachment":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/media?parent=178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/categories?post=178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/tags?post=178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}