Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

Maybe You Can’t Fix Stupid, but You Can Fix Your Security

Maybe You Can’t Fix Stupid, but You Can Fix Your Security

It’s easy to dismiss network security if you run a small business that seemingly isn’t a target of malicious attacks. Unfortunately, this dismissive attitude can put your organization at risk, as even a simple security issue could be enough to expose your company to dangerous entities. In fact, we would call it foolish not to secure your organization; and one of the most infamous security failings in history stems from this.

The Equifax Problem
During the months of May and July of 2017, a credit-reporting firm called Equifax fell victim to a data breach that exposed a whopping 148.1 million records containing personally identifiable information. To put this in perspective, the Equifax data breach exposed almost half of the population of the United States of America.

In the wake of this breach, the former Equifax CEO Richard Smith was cross-examined by Congress. Smith’s defense argued that “human and technology errors” were at the heart of the issue. Ultimately, the Chairman of the House Energy and Commerce Committee, Greg Walden, came to the following conclusion: “I don’t think that we can pass a law that fixes stupid.”

How to Fix Your Data Security
While it’s true that there is no guarantee legislation would resolve the issue, you still need to make sure that your organization is doing the best that it can to keep threats from infiltrating its network. You can begin by implementing specific standards on a company-wide level or a case-by-case level.

Here are some ideas that you can start with:

  • Start with compliance: Compliance regulations don’t always have data security in mind. That being said, it’s still an important part of managing your data security, as you could potentially be subject to fines and other troubling regulations.
  • Resolve vulnerabilities: 99 percent of exploits rely on vulnerabilities remaining unresolved in network infrastructures. These exploits also often exploit vulnerabilities that are at least a half a year old. You should make patching these vulnerabilities a priority so that you can best protect your data.
  • Centralize your data security: There needs to be someone at the helm of your data security endeavors. If there isn’t, you make protecting your data much more difficult. This person should be responsible for implementing access control and making sure that nobody can access data that they wouldn’t need for their ordinary workday.

Encouraging Employee Security
Employees hold more sway over your business’ security than they may realize. This makes it difficult to protect important assets, because if you’re overly cautious, you could be compromising your business’ ability to operate as intended. For your benefit, here are a couple of ways that your organization can help employees remain cognizant of their responsibilities.

  • Lazy credential habits: Password problems have persisted in business for a long time. Employees should never reuse passwords or usernames for every account that they have. Each password should be a complex, containing letters, numbers, and symbols to maximize security. You can use a password management system if this gets to be a bit too much for your employees.
  • Oversharing information: You should help your employees work toward limiting just how much information they share about themselves on social media so that passwords are not as easily predicted. Avoid using personal anecdotes whenever possible, and restrict who can see what information to minimize the chances of this happening. You also don’t want information to spread outside of the office, as an invoice or receipt with a customer number could be all a hacker needs to cause trouble.
  • Using the wrong Wi-Fi: Public Wi-Fi is dangerous and therefore, not the ideal way to access secure data. You should work together with your employees to make sure that they have secure access to company documents whenever they need them. A virtual private network is a great way to do this, as it encrypts information sent and retrieved by your devices.

Does your business need to augment security? FRS Pros can help. To learn more, reach out to us at 561-795-2000.

Tip of the Week: Canned Responses can Streamline C...
Some of the Value that Cloud Computing Offers
 

Comments 1

George Kermode on Thursday, 12 July 2018 02:59

Fixation of the security is done for the acknowledgement for the individuals. All the moments of the joy and british essay writer have been collected for the promotion of the items of the collection and its management in subsequent time period.

Fixation of the security is done for the acknowledgement for the individuals. All the moments of the joy and [url=http://www.ukbestessay.net/]british essay writer[/url] have been collected for the promotion of the items of the collection and its management in subsequent time period.
Already Registered? Login Here
Guest
Sunday, January 20 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Business Computing User Tips Cloud Business Management Google Tech Term Hardware Software Hackers Malware Microsoft Computer Mobile Devices Data Backup Productivity Smartphone Efficiency Hosted Solutions Browser Cybersecurity Windows Windows 10 Data Recovery Data Security Android IT Services Smartphones Office 365 Apps Email Internet of Things Outsourced IT Data Innovation Cybercrime Business Continuity Upgrade Operating System VoIP IT Support Backup Communications Saving Money Alert Mobile Device Management Disaster Recovery Law Enforcement Ransomware Vulnerability Phishing Business Money Managed IT Services Microsoft Office Spam Passwords Server Collaboration Network Employer-Employee Relationship Applications IT Support Best Practice Workplace Tips Chrome Small Business Unsupported Software Artificial Intelligence Windows 10 App Computers Information Technology Cloud Computing Virtualization Miscellaneous Holiday Telephone Systems OneNote Gadgets Router Tech Support Blockchain Two-factor Authentication Google Drive Information Managed Service Provider Managed IT Users Managed IT Services Networking Augmented Reality Google Assistant Gmail Application Commerce Save Money Government Word Encryption WannaCry Safety Patch Management Wireless Charging Robot Google Docs Project Management Budget Devices The Internet of Things Social Media Risk Management SaaS Wireless Technology Proactive IT Business Technology Data Management Data Breach VPN iPhone Touchscreen Data Storage Facebook Wi-Fi WiFi Productivity Travel Mobile Device Sports Excel Update Politics Quick Tips Fraud Shortcut Hosted Solution Audit BDR Password Access Control Avoiding Downtime Mobility Evernote Data Protection Managed Service Automation User Error Bring Your Own Device Mobile Security Cortana Cost Management Communication Hacking Hyperlink Touchpad Charger Legal Marketing BYOD Going Green Social Data Loss Ciminal Conferencing Data Theft Antivirus Hybrid Cloud Machine Learning Device Security Identity Legislation Language Wireless Internet Files Saving Time Adobe Workers IT Solutions DDoS Employee-Employer Relationship Value Disaster Wasting Time Humor Webinar Recovery Data Privacy Windows 7 Gifts Computing Consultant Amazon Windows Ink Hacker Comparison Remote Monitoring Gamification Keyboard Shortcuts Licensing Personal Information Updates Emergency Accessory Outlook IT solutions Software as a Service Administrator Microsoft Excel IT budget Point of Sale Lithium-ion battery Hard Drive Display Credit Cards App store Virtual Assistant Streaming Media Reputation Google Maps Spyware Data storage Specifications Virus Identity Theft Memory Human Resources History Microsoft Word iOS WIndows Server 2008 Testing Computer Forensics Peripheral Windows 10s HBO Bandwidth Access Remote Computing Health File Sharing Chromebook Co-Managed Services Screen Mirroring Alexa for Business Chromecast Apple Computer Care Nanotechnology Settings Sales Proactive Vendor Management Unified Threat Management Financial Payroll Tablets Wireless Maintenance Telephony Camera Social Engineering Scam Meetings Management Sync Solid State Drive Internet Exlporer Search Storage Root Cause Analysis Printing Telephone Laptop FAQ Emails Cast Transportation Edge Retail Websites Samsung Upgrades Security Cameras Private Cloud NFL eWaste Computer Fan Uninterrupted Power Supply Projects Identities PowerPoint Admin Hard Disk Drive IT Management Vendor Phone System Compliance Benefits Save Time Printers End of Support Computer Accessories Cache HaaS Flexibility Music Regulation Relocation Battery Smart Technology Downtime Instant Messaging Training Monitors Television CrashOverride Twitter Scalability Analytics PDF Entertainment Keyboard Company Culture Mobile Computing Black Market Cleaning Thank You Office es Big Data Automobile Text Messaging Managing Stress USB Worker Congratulations How To Books Office tips Video Games Experience Education Hiring/Firing Advertising Work/Life Balance Virtual Reality Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records