Backup and Disaster Recovery
One of the best methods for protecting your company data from a ransomware event or having your computer equipment fail is to have a solid backup and recovery plan. Surprisingly, most companies do not do this - many fear it is too expensive, some feel there is no need. Putting a plan in place does not have to be expensive or complicated and many times can be done quickly.
By now everyone has heard about using ZOOM for online meetings and chats. Some other tools are:
ezTalks Meetings. ... Cisco WebEx. ... Skype. ... Zoom. ... TeamViewer. ... Apache OpenMeetings. ... Join.me. ... Google Hangouts. Google has several solutions and apps, like Google Voice.
Although there are many free anti-virus software packages out there, which may be okay for home use, you might want to consider a paid provider for your business. The costs are not always prohibitive, you get current updates and often times free support. For a few dollars the difference could be saving your company from a cyber disaster.
Computer Security Suggestions
Eight Characters Is Not Enough
Practice good password management. Use a strong mix of characters, and don’t use the same password for multiple sites. Don’t share your password with others, don’t write it down, and definitely don’t write it on a post-it note attached to your monitor. If you are able to use two-factor authentication, then do so – it is well worth the time and effort!
Lock It Up
Never leave your devices unattended. If you need to leave your computer, phone, or tablet for any length of time—no matter how short— use the device’s locking feature so no one can use it while you’re gone. If you keep sensitive information on a flash drive or external hard drive, make sure to keep it locked-up in a secured cabinet, drawer or appropriate area as well.
Practice Safe Clicking
Always be careful when clicking on attachments or links in email. If it’s unexpected or suspicious for any reason, don’t click on it; report it immediately to a supervisor. Double check the URL of the website the link takes you to: bad actors will often take advantage of spelling mistakes to direct you to a harmful domain.
Beware of Browsing
Sensitive browsing, such as banking or shopping or working, should only be done on a device that belongs to you, on a network that you trust. Whether it’s a friend’s phone, a public computer, or a cafe’s free Wi-Fi—your data could be copied or stolen. Nothing can guarantee complete safety.
Don’t Let Browsers Be Your Password Bank
If your browser (i.e. Internet Explorer, Firefox, Edge, Chrome) has a password saver feature – shut it off! Once someone accesses your browser, they could access anything you have no matter how secure!
Physical Cyber Safety
Be conscientious of what you plug in to your computer. Malware can be spread through infected flash drives, external hard drives, and even smartphones.
Share Less Sensitive Information
Watch what you’re sharing on social networks. Criminals can befriend you and easily gain access to a shocking amount of information—where you go to school, where you work, when you’re on vacation—that could help them gain access to more valuable data.
Make sure your anti-virus software is always up to date.
Cut Out The “Middle Man”
Offline, be wary of social engineering, where someone attempts to gain information from you through manipulation. If someone calls or emails you asking for sensitive information, it’s okay to say no. You can always call the company directly to verify credentials before giving out any information.
Stay on Top of Your Accounts
On a personal note - be sure to monitor your bank, credit card and online retail accounts (i.e. Amazon) for any suspicious activity. If you access online portals or web sites for business, check to see if you see something unfamiliar. Don’t use the same password over again for personal or work.