5 ways to secure personal info

Security_Sep30_CIf you are a small business owner or manager you are likely the person that everyone turns to when things are going well, and not so well. One problem you may face is a security breach, where private information is stolen or leaked. If this were to happen, you will likely be asked questions and maybe even held accountable. Therefore, it is advisable to take steps to ensure that the personal information in your systems is secure.

As October is Cyber Security month in the US, it’s the perfect time to take a look into ways you can make your business and systems more secure. One of the best places to start is to look at how your company stores and protects personal information. Here are five tips that can help you protect personal information in your company.

1. Change your passwords
One of the weakest links, in terms of security, is not the programs, networks, or systems, it’s actually the passwords used to access these. You should ensure that your passwords are strong – at the very least use a mixture of capital and lowercase letters, numbers and special characters like ! or @. This makes passwords harder to crack.

It is a good idea to change your passwords on a regular basis. You should change them at least once a year, but far preferable is to change these every 90 days. This will minimize the chances of your password being hacked and likely increase overall security.

2. One password shouldn’t rule them all
The number of password protected systems and sites that we use on a daily basis is increasing and it can be tempting to have one or two passwords for all of these systems. This is not a good idea though because if one password is compromised, a hacker could gain access to all of your systems and the personal information stored on them.

The best solution is to have a unique password for each system and one that is as different as possible. Using a password manager like Dashline or LastPass might be worth looking into but just be sure to use a separate password to access to this system as well!

3. Don’t keep everything
While passwords are a common way hackers can access systems, another popular way they get in is through malicious links in email, social media posts or online advertising. These links can be viruses and trojans that install backdoors to systems, allowing hackers access to files and potentially sensitive information.

In order to maximize security, you should look at every link and ensure it is legitimate before you click on it. The best way to do this is to look at the sender’s email address and ensure there are no spelling mistakes or weird characters. Look for any strange spelling, and if possible check there is https:// at the beginning of all links. This indicates that the page is legitimate. If a link seems even remotely suspicious, simply delete it.

4. Don’t react immediately
Communications, especially in online ads and emails, often urge you to click immediately. Pause for a moment, inspect the email or links and try to verify them. As a rule of thumb, if it sounds too good to be true, it is. Therefore, think first and don’t click the link.

5. Develop policies
In order to secure your systems and protect information stored within, you should develop a policy for all staff to follow. Be sure to look at how you plan to protect information, where it is stored and how it is stored, as well as who has access to it, how can it be accessed, and what happens when the policy is breached. How do mobile devices/devices brought in by employees fit into the plan?

Once you have developed a policy, communicating it to your employees and ensuring that they are all on the same page in following it is essential. We know it can be challenging to develop an effective policy, so why not contact us? We may be able to help not only secure your private information but also develop a sound policy that is workable.

Published with permission from TechAdvisory.org. Source.

5 tips for disaster communication

BCP_Sep30_CAs we all know, disasters can strike at any time. Business owners and managers often go to great lengths to ensure that their business is protected or prepared for any disaster by implementing contingency plans. During a disaster however, the biggest issue businesses face is communication. If this breaks down, even the best laid plans will go to waste.


Define: Packet delays

VoIP_Sep24_CWhile VoIP (Voice over Internet Protocol) systems have become the go-to solution for business telecommunications, it’s not perfect. Sure, on the most part, the systems offer better call quality than traditional phone lines but there will be times when there are delays and poorer call quality. This is usually caused by what experts call ‘packet delays’, have you heard this term before?


Storage limits for Google Drive

GoogleApps_Sep30_CCloud-based platforms like Google’s various apps are quickly becoming the must-have platforms for businesses. Take for example Google Drive which combines cloud storage and a productivity suite offering a comprehensive business solution. While there is little doubt as to the usefulness of Drive, some users often ask as to whether there is a limit to the size of files that can be stored and created.


5 tips to get more out of social media

SocialMedai_Sep24_CIn order for a business to be successful, you must have a solid marketing strategy. These days that means having an Internet presence. While having a website is a good start, most marketing relies to some extent on social media. With a solid social media presence you can stimulate not only increased brand awareness but also achieve higher search ranking.