“OOPS!” Was That Your Data?
Passwords, Email, Website, Laptop and Mobile Devices
While purchasing and installing a security system for your office is a great idea, it may not be adequate for today’s times to ensure your business’ security. Read below to see what technological loopholes may exist and how to close them up, as well as a video demonstrating the effects of not planning.
While a secure lock and a camera system is highly advisable, in today’s technological times more steps may be required to keep your infrastructure secure. Where should we start? (Or watch the YouTube clip below to see how easy a security breach can happen).
Staff security awareness |
PASSWORDS
Do you (or your employees) store your passwords on a sticky note on the desk?
If yes, a customer may see it and log in to the computers and access company data. Therefore, we highly advise keeping the passwords in a secure place (your head) and shred all passwords written on paper.
Do you use the same password for all your employees?
Many programs maintain logs of which user did what. However, if you are all using the same passwords, odds are you are all logged into the same user which will therefore not allow for you to see who did what if it is needed at a later point in time.
EMAILS
Did you ever send your employees a test email – to see if they click on links which may infect their computer and network?
Most small businesses have not done this, however you may try employing this or other methods to help educate your employees in taking the proper email security precautions.
WEBSITES
While you can send out a phishing email to your fellow office mates to see who “falls for the trap” and clicks on the bad links, this is slightly harder to do when it comes to website “testing”. Therefore, we recommend a yearly donut and education snack break where everyone gets a short tutorial on what is considered safe territory and what is not safe territory.
LAPTOPS
Do you (or others in your office) have company data on laptops?
Then odds are those laptops have left the office.
Is sensitive data encrypted?
Are passwords saved on the computer?
Are they connecting to the Internet via unsecured WiFi connections?
Perhaps you should take a moment to determine how secure your laptop is and what can be done to close up any security openings.
MOBILE DEVICES
Welcome to 2014, where all your files and passwords are stored on your mobile devices (cell phones and tablets). While a password may be of some help, perhaps setting up an instant (remote) wipe app on all mobile devices will allow for some added security in case of a lost or stolen cell phone.
Have a question or comment on this topic?
We want to hear from you!
Click here or call us at 718-676-6910