Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

FRS Pros has been serving the United States area since over a Decade, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Maybe You Can’t Fix Stupid, but You Can Fix Your Security

Maybe You Can’t Fix Stupid, but You Can Fix Your Security

It’s easy to dismiss network security if you run a small business that seemingly isn’t a target of malicious attacks. Unfortunately, this dismissive attitude can put your organization at risk, as even a simple security issue could be enough to expose your company to dangerous entities. In fact, we would call it foolish not to secure your organization; and one of the most infamous security failings in history stems from this.

The Equifax Problem
During the months of May and July of 2017, a credit-reporting firm called Equifax fell victim to a data breach that exposed a whopping 148.1 million records containing personally identifiable information. To put this in perspective, the Equifax data breach exposed almost half of the population of the United States of America.

In the wake of this breach, the former Equifax CEO Richard Smith was cross-examined by Congress. Smith’s defense argued that “human and technology errors” were at the heart of the issue. Ultimately, the Chairman of the House Energy and Commerce Committee, Greg Walden, came to the following conclusion: “I don’t think that we can pass a law that fixes stupid.”

How to Fix Your Data Security
While it’s true that there is no guarantee legislation would resolve the issue, you still need to make sure that your organization is doing the best that it can to keep threats from infiltrating its network. You can begin by implementing specific standards on a company-wide level or a case-by-case level.

Here are some ideas that you can start with:

  • Start with compliance: Compliance regulations don’t always have data security in mind. That being said, it’s still an important part of managing your data security, as you could potentially be subject to fines and other troubling regulations.
  • Resolve vulnerabilities: 99 percent of exploits rely on vulnerabilities remaining unresolved in network infrastructures. These exploits also often exploit vulnerabilities that are at least a half a year old. You should make patching these vulnerabilities a priority so that you can best protect your data.
  • Centralize your data security: There needs to be someone at the helm of your data security endeavors. If there isn’t, you make protecting your data much more difficult. This person should be responsible for implementing access control and making sure that nobody can access data that they wouldn’t need for their ordinary workday.

Encouraging Employee Security
Employees hold more sway over your business’ security than they may realize. This makes it difficult to protect important assets, because if you’re overly cautious, you could be compromising your business’ ability to operate as intended. For your benefit, here are a couple of ways that your organization can help employees remain cognizant of their responsibilities.

  • Lazy credential habits: Password problems have persisted in business for a long time. Employees should never reuse passwords or usernames for every account that they have. Each password should be a complex, containing letters, numbers, and symbols to maximize security. You can use a password management system if this gets to be a bit too much for your employees.
  • Oversharing information: You should help your employees work toward limiting just how much information they share about themselves on social media so that passwords are not as easily predicted. Avoid using personal anecdotes whenever possible, and restrict who can see what information to minimize the chances of this happening. You also don’t want information to spread outside of the office, as an invoice or receipt with a customer number could be all a hacker needs to cause trouble.
  • Using the wrong Wi-Fi: Public Wi-Fi is dangerous and therefore, not the ideal way to access secure data. You should work together with your employees to make sure that they have secure access to company documents whenever they need them. A virtual private network is a great way to do this, as it encrypts information sent and retrieved by your devices.

Does your business need to augment security? FRS Pros can help. To learn more, reach out to us at 561-795-2000.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, June 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Business Management Cloud Business Computing Network Security Google Software Cybersecurity Windows Tech Term Microsoft Malware Hosted Solutions Hackers User Tips Cybercrime Data Backup Hardware Computer Smartphone Data Recovery Innovation Browser Operating System Android Mobile Devices Data Security Apps Productivity Backup Alert Business Continuity Vulnerability Ransomware Phishing Outsourced IT Internet of Things Office 365 Email Law Enforcement Best Practice Business Efficiency Smartphones Chrome Disaster Recovery Saving Money Money Mobile Device Management IT Support Server Managed Service Provider Telephone Systems Microsoft Office Managed IT Two-factor Authentication Gadgets Unsupported Software Communications Windows 10 Small Business Cloud Computing Spam Windows 10 Computers Information Technology Tech Support IT Services Employer-Employee Relationship App Google Drive Data Collaboration Network Virtualization VoIP IT Support Avoiding Downtime VPN Blockchain Sports Mobile Security Risk Management Password Commerce Applications Cortana Wi-Fi Update Proactive IT Data Storage Wireless Charging iPhone Upgrade Devices OneNote Wireless Technology Data Breach Patch Management Audit Application Hosted Solution The Internet of Things Productivity Safety Excel Shortcut Fraud Managed IT Services Holiday Cost Management Google Assistant Artificial Intelligence Automation WannaCry User Error Managed IT Services Government Hacking Gmail Politics Save Money Social Media Google Docs BDR WiFi Facebook Router Robot Data Management Quick Tips Miscellaneous Data Protection Mobility Root Cause Analysis File Sharing Upgrades PowerPoint Chromecast IT Management Maintenance Hard Disk Drive Tablets Remote Computing Social Engineering Telephony Augmented Reality Storage FAQ Social Identity Wireless Internet IT Solutions eWaste NFL Identities Uninterrupted Power Supply Charger Consultant Laptop Data Privacy Gamification Device Security Word Language Legislation Hard Drive Files Touchscreen Touchpad Memory WIndows Server 2008 Recovery iOS Windows Ink Comparison History Chromebook Screen Mirroring Health Humor Financial Administrator Spyware Google Maps Identity Theft Meetings Specifications Antivirus Lithium-ion battery Wireless Virus Printing Cast Emails Search Vendor Management Access Outlook Computer Fan Apple Sales Private Cloud Data storage Proactive BYOD Evernote Emergency Marketing Sync Samsung Edge Internet Exlporer Point of Sale Retail Websites Value Networking Webinar Passwords Transportation Ciminal Data Loss Remote Monitoring Conferencing SaaS Data Theft Workers IT solutions Adobe Going Green Project Management DDoS Disaster Gifts Reputation Computing Computer Forensics Budget HBO Updates Windows 10s Licensing Computer Care IT budget Nanotechnology Microsoft Excel Credit Cards Unified Threat Management Legal App store Management Streaming Media Microsoft Word Solid State Drive Travel Encryption Settings Thank You Music Flexibility Worker Instant Messaging Scam Advertising Congratulations Communication Analytics Scalability Users Employer Employee Relationship HaaS Big Data Save Time Relocation Managing Stress Computer Accessories Television Personal Information CrashOverride Workplace Tips Books How To Hacker Education PDF Work/Life Balance Mobile Device Mobile Computing Electronic Medical Records Current Events Keyboard Text Messaging es Office tips Battery Hiring/Firing Cache Entertainment Black Market Benefits End of Support Training Monitors Automobile Twitter USB Smart Technology Company Culture Experience Video Games Virtual Reality Crowdsourcing Phone System Cleaning Office