{"id":178,"date":"2014-05-01T16:54:00","date_gmt":"2014-05-01T16:54:00","guid":{"rendered":"https:\/\/ntegrait.com\/how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take.html"},"modified":"2014-05-01T16:54:00","modified_gmt":"2014-05-01T16:54:00","slug":"how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/how-to-protect-your-business-from-todays-pervasive-cyber-threats-6-easy-steps-to-take\/","title":{"rendered":"How To Protect Your Business From Today\u2019s Pervasive Cyber Threats\u2014 6 Easy Steps To Take."},"content":{"rendered":"
Did you know that\u2014?<\/p>\n
If your small business has a weak security system, it will be targeted in attacks aimed at larger corporations?<\/strong><\/p>\n The threat of cyber criminals accessing your confidential business data and your money is more real today than ever before.<\/strong><\/p>\n The U.S. House Committee on Small Business reports that:<\/p>\n \u201cSmall businesses generally have fewer resources available to monitor and combat cyber threats, making them easy targets for expert criminals. In addition, many of these firms have a false sense of security and believe they are immune from a possible cyber-attack.\u201d<\/strong><\/p>\n The U.S. government also believes that state-sponsored cyber attacks and espionage will continue to grow. \u00a0<\/strong><\/p>\n Don\u2019t lull yourself into a false sense of security.\u00a0 Take action before the criminals do:<\/strong><\/p>\n 1. Educate your employees, and develop a written security policy for your business.\u00a0 <\/strong>Educate your employees about the real possibility of cyber attacks.\u00a0 Include information about the threats of opening emails or clicking on suspicious links. They should also be cautious about downloading apps on mobile devices they use for business. Stay current about the latest, security issues (contact {company} and we can help}, and update your policy as needed. You should also create a contingency plan if business data is compromised, or if your employees\u2019 personal computer devices containing business information are lost or stolen.<\/p>\n 2. Use strong passwords and change them regularly.<\/strong> \u201c123456\u2033 \u201cqwerty,\u201d \u201cwelcome,\u201d \u201cninja,\u201d and \u201cabc123\u2033<\/p>\n Use difficult-to-decipher passwords.\u00a0 Try using words spelled backwards, and throw in a random special symbol or number. Also, use different passwords on all your accounts. Stay a step ahead of the hackers with difficult-to-crack, and numerous passwords.<\/p>\n 3. Encrypt, encrypt, encrypt.<\/strong> \u00a04. Do you know what\u2019s on your network?\u00a0 You might be surprised.<\/strong> 5. Ensure you and your employees safeguard devices when traveling.<\/strong>\u00a0<\/strong> 6. <\/strong>Use multifactor authentication to log into your bank\u2019s website.<\/strong> FDIC (U.S. Federal Deposit Insurance Corporation) recommends that you actually use a separate computer for online banking? This way you won\u2019t accidentally download malware from email phishing links that record your keystrokes.<\/p>\n This is just the beginning of what you can do to protect your business from cyber thieves.\u00a0 For more in-depth information and precautions you should take, contact us by phone or email.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":" Did you know that\u2014? If your small business has a weak security system, it will be targeted in attacks aimed at larger corporations? The threat of cyber criminals accessing your confidential business data and your money is more real today than ever before. The U.S. House Committee on Small Business reports that: \u201cSmall businesses generally…<\/p>\n","protected":false},"author":5,"featured_media":179,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[53],"tags":[],"class_list":["post-178","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-techtips"],"acf":[],"yoast_head":"\n
\nDon\u2019t use common ones like:<\/p>\n
\nEncrypt your data to ensure it is safe. In this case it will be safe even if it\u2019s contained on a lost portable device.\u00a0 \u00a0Also make use of encryption software that scrambles data so it\u2019s unreadable by cyber criminals.\u00a0 \u00a0Check out Windows BitLocker Drive Encryption (http:\/\/windows.microsoft.com\/en-US\/windows7\/products\/features\/bitlocker<\/a>), or FileVault for your Macs (http:\/\/support.apple.com\/kb\/HT4790<\/a>).<\/p>\n
\nYou need to know what\u2019s going on inside your network. If you notice any strange activity, call {company} before your data is compromised. Only a true security expert can protect you in this case.<\/p>\n
\nDid you know that in high-risk countries like China, Russia or Iran, computers are often physically searched when you\u2019re out of your hotel room? \u00a0Be sure to keep your computing devices with you at all times. Avoid bringing your smartphone to these countries as well. They may be spied on when you use them.\u00a0 It might even be a good idea to use a separate computer just for travel purposes that doesn\u2019t contain any confidential information. Also be sure to wipe it clean when you return home before connecting it to your networks, just in case you picked up a nasty virus!<\/p>\n
\nThis means that to access your business (or personal) account you would need some other form of identification (such as a code sent via text to your smartphone). \u00a0This makes it more difficult for a thief to access your account.\u00a0 Did you know that the<\/p>\n