|Three public Wi-Fi security issues|
The Internet has become an integral part of all businesses, with some companies employing remote workers. Many business owners and managers also check their email or connect to office systems while on the road, maybe even connecting to the Internet on the many open or public Wi-Fi networks available. While these connections are useful, they can pose a security risk to many businesses.
If you or your employees work outside of the office, and rely on, or frequently connect to public Wi-Fi connections, there are three security dangers you should be aware of.
1. Fake networks
The number of businesses offering free Wi-Fi to customers, especially coffee shops and restaurants, is growing. Some hackers have actually taken to setting up networks with names that are the same as a location or business in hopes that people will connect to it, believing it is an open network.
The issue is that they may have attached data monitors that collect data – including passwords and other private information going into and out of the network. Some have even gone so far as to set up a portal site that one must navigate to in order to log in and use the service – similar to what you see when you use most public Wi-Fi connections. Only these sites are loaded with malware which can be installed onto your system once you log in.
In order to avoid this, it is a good idea to look at the name of the network you are actually connecting to and check whether there is more than one with a similar name, or if there are any spelling mistakes. If you are unsure, the best approach is to check the name of the network at the business which is providing this connection.
2. Shared files or folders
Both major operating systems – OS X and Windows – have files and folders that automatically share any folders and files put into them with other users on the same network. Some business users put important files in these folders while at the office in order to allow colleagues access to them.
The problem with this is when you connect to a public Wi-Fi connection. Other people on that network may also be able to see those files. If you didn’t take the important files out of the folder, they could potentially steal the data contained within. Hackers know this, and may sit on the networks looking for other computers with shared files.
In order to avoid this, you should ensure that you aren’t sharing files stored in public folders on your computer. Try using other ways to share documents like a cloud storage provider.
3. The man-in-the-middle
A man-in-the-middle attack is a form of hacking where the hacker uses technology to actively listen to or capture data being transmitted over a network. What this means is that if there is someone capturing data, they could theoretically gain access to anything that gets sent outside of the network. This could include private files, passwords and more.
If you or an employee connects to the office remotely while connected to a public network, one way to minimize the chances of data being intercepted is by using a VPN. These connections set up a direct link between the computer and the home network, and make it difficult for those who aren’t part of that network to connect to and view data that is transmitted over this connection.
On top of this, it is a good idea to avoid entering passwords or other important information like bank account and ID numbers while connected to public networks.
If you are looking for ways to keep your data secure while out of the office, get in touch with us today to see how we can help.
Published with permission from TechAdvisory.org. Source.
|Updates security features for Chrome|
The security of systems and computers is usually one of the most important priorities to many businesses. To ensure security, many companies employ anti-virus protection and other security systems, and yet malicious software still makes it through. The way most viruses enter these systems is through the Web browser. In an effort to curb these attacks Google has recently updated Chrome with some valuable security features.
|Cloud & virtualization|
When listening to tech experts speak, or reading tech blogs, it’s not uncommon to see or hear mention of ‘the cloud’. This is normally followed closely by the word ‘virtualization;, which has led to many believing that the two terms are synonymous, when they are actually quite different. Because of this, there is often confusion among business owners.
|Should businesses look into patterns?|
Established small and medium business owners often have to deal with obstacles along the way, such as their sales and profits levelling off, or their companies not growing as fast as they had in the past. These are common issues that many businesses face. While it can be tough to break through this period of stabilization, there is one tactic that could help: Analyzing your previous data to spot patterns that can help shed light on how your business is doing.
|Controlling notifications on Drive|
With the increase in office collaboration we are now seeing people working on the same document at the same time. Because of this, functions like Comment are increasingly important to users too. If you use Google Drive, you know that you will get notifications from time-to-time about your documents, but do you know how to control them?