Cyber-attacks can destroy your business. Before you invest in high-tech security systems to detect prying eyes, invest in your best line of defense: your employees. With a little training and a lot of awareness, you and your employees can prevent information thieves from accessing your financial data, customer records and proprietary information.
Drill yourself and your employees in the following practices, and you will take a giant leap forward in protecting your company. All of these guidelines are actionable without buying any additional software. Make it clear that you are practicing these guidelines yourself and you are likely to get buy-in on keeping information safe.
Passwords on Work Computers
Passwords are your greatest point of vulnerability. If a malicious person obtains a password, your entire network is at risk. Here are some best practices:
Techniques for Creating Exceptional Passwords
A password should contain eight characters or more, and should use special characters that are neither letters nor numbers, such as exclamation points. Also, use a combination of uppercase and lowercase letters.
Use a passphrase instead of a password. Select a phrase that you can remember, such as, "I never learned how to swim." Add punctuation that you can remember as well. Replace words that describe numbers with the actual numeral. "I was 7 when I first rode a horse."
Create acronyms. Take the first letter of the words in a phrase to make a password. "I was seven when I first rode a horse" becomes "iwswifrah".
Try secret codes. Create your own rules, such as adding the dollar sign to numbers or following capital letters with a percent sign. This example might look like this: "I% never went to public school until I% was $5." This is just an example. Create rules you can remember.
Security on Mobile Devices
If you use a smartphone or tablet to access your work files and services, use passwords on these mobile devices. They are susceptible to being lost or stolen.
Use different passwords on mobile devices than you use on laptops or computers.
Check your device's security or setting features to see if you have the ability to use any of the following:
Email Best Practices
Staying alert when handling email can prevent many cyber security breakdowns. Make sure your employees follow these best practices regarding email:
Phishing Emails
Some con artists try to get your information through phishing emails. These are official-looking emails that ask for information such as passwords, account numbers or other information that could make access to company accounts easier. .
You are often urged to act quickly to resolve an issue, and in doing so, you may provide log in codes and other company access secrets. The sender is trying to scare you into giving out vital information.
Never comply with these emails, and do not click the links. If you do click the links and discover your mistake, report the incident immediately.
Most importantly, never respond with any login information, account names, numbers or passwords. No company will ask for such data in an email.
Locking Devices When You're Away
If you leave your computer open while going to lunch, or leave your phone on your desk when you go to a meeting, you are allowing anyone who passes by to have access to your device. Think about this: since you are already logged in, they won't even need your username or password to see information.
Lock your device when you leave it, even for a few moments. Don't rely on the device's automatic locking feature. It could take too long. Anyone who touches your keyboard can keep your computer, phone or tablet from timing out. .
To lock a Windows computer, hold down the Windows key and the L key at the same time. As an alternate method, Press CTRL, ALT, and DEL keys and hold them down. Choose the Lock option on your screen.
When you want to lock your Mac OS X device, hold down Control, Shift, and Eject (or Power) keys.
Locking your devices does not mean you are suspicious of coworkers; it means you are security-conscious and recognize that you are responsible for the data you possess.
Security When Working Remotely
Employees who work remotely must take extra precautions to remain cyber-safe.
If you log in to your company system through a VPN (Virtual Private Network), you can access the same data you have access to at work. However, if your computer has spyware, you could inadvertently expose company information. Spyware allows an outsider to transfer information from your hard drive. For that reason, you should never access the company network from a computer that lacks virus and spyware protection.
Secondly, your Wi-Fi access should be password-secured. If you don't require a password to access your Wi-Fi, any neighbor or passerby who snoops around in your wireless signal can see everything you are doing online. Don't use public WiFi for work communications. Hackers routinely search public WiFi for computers they can break into.
Your Employees are Your Best Defenders
Turn these pointers into lesson you repeat with employees periodically. Post important security measures in work areas, and create an atmosphere where employees feel free to report security issues or concerns. All the sophisticated technology in the world won't be as effective in keeping your company secure as diligent and watchful employees.
Enter your email to start registration.
Enter your email to start registration.
Enter your email to start registration.
Peoplebank acknowledges the Traditional Owners of Country. We pay our respects to the Aboriginal and Torres Strait Islander cultures, and to elders past and present, whose land we stand upon today.
We welcome all cultures, all religions, all colours, all beliefs, all ages, all sizes, all types, all people.
Peoplebank acknowledges the Traditional Owners of Country. We pay our respects to the Aboriginal and Torres Strait Islander cultures, and to elders past and present, whose land we stand upon today.
We welcome all cultures, all religions, all colours, all beliefs, all ages, all sizes, all types, all people.