Always Use Protection
Your mother always told you to use protection. In fact, if she did any kind of proper motherly brainwashing job it’s engraved in your mind. So, WHY do we get so lax when it comes right down to it? Well, maybe it’s because, as small business owners, we have seemingly more pressing things to worry about (like making payroll, CUSTOMERS, employee issues and just putting out fires in general). Besides…it won’t happen to me…that only happens to OTHER people. If you are a small business owner guarding yourself from cyber crimes should be up there on the top of your list. Those fires that you put out on a daily basis won’t compare to the back draft you’re going to feel when your company falls victim to cyber crime.
When thinking about cyber crime we tend to think of nameless, faceless bad guys “out there” that we don’t know and because we can’t SEE the threat we tend to forget it’s out there. No matter how successful your business is or isn’t, the fact is, that you are MUCH more “attractive” a target than you think. If you leave your back door open every night…somebody is GOING to come in eventually and the after effects can be devastating.
But strangers aren’t the ONLY threats out there to your cyber security. Employees can jeopardize all that you’ve worked for even easier than you’d expect and not necessarily on purpose.
Our advice? Don’t be an easy target. That IS in fact what those bad guys are looking for. Securing your surroundings is essential in today’s technology environment so I’ll break it down for you.
1. Anti-Virus. Purchase a top rated anti-virus for your network AND every workstation (including ones that access your network remotely).
2. Secure network connection. If you or your staff must access your network remotely invest in a secure encrypted connection. Static IP with a good VPN router is a great way to go and doesn’t compromise speed or graphic quality but there are other options.
3. Secure your premises. Invest in a security system for your company from a licensed and insured source. If you have several employees you may want key card access to certain areas of the building (including the server room/closet) and cameras on the parking lot, doors, registers, etc.
4. Limit employee access. Keep employees out of websites that are known to easily infect their computer (and thereby YOUR entire network). Don’t allow employees to leave passwords lying around. Make sure that they shred sensitive documents. Have a good email usage policy and be selective as to which employees have access to network admin, financials, etc.
5. Enlist the services of a technology company you can trust. Be SURE that the company you hire has longevity, is reputable and has background checked THEIR employees. What are their policies regarding confidentiality of YOUR data and can they share their email usage policies with you?
Random DID YOU KNOW? Hacking…it’s not just your computer anymore. Because of increased wireless technology in new vehicles and the computerization of key systems (like the safety critical ones) hackers can actually hijack your vehicle’s systems from their computer. So, like us, manufacturers also have to work to guard against cyber bad guys.
Copyright © 2010 Help Me!!® Tech Team, a division of HELP ME!!® Computers, LLC
- Mobile Devices & Your Network
- Can I just ignore a virus and save some money?
- fix my PC
- The Case for Managed Services
- Is a blog a blog or not really a blog?
- Daysi Bonaparte on Is a blog a blog or not really a blog?
- Arnold Tompkins on Is a blog a blog or not really a blog?