Skip to main content

Train your staff: Your first and best firewall

Train your staff: Your first and best firewall

Protecting your organization against cyber threats can seem like a challenge that involves extremely high-tech wizardry, sophisticated knowledge etc.. Much of this is true. Protecting your data and your company against cyber threats requires skilled professionals. But that isn't only what is needed. The first line of defense in data security is everyday common sense and diligence on the part of everyone who works in your organization.

Some thoughts . . .

The first challenge in beefing up your data security is creating awareness among all of your employees that they really do have a serious role in data security. Many of the ways they can protect your data are simple, but until they are aware that they may represent a threat to data integrity they won’t take their role in protecting your company seriously. Provide training that both explains that their actions may unknowingly create problems, and then review what they can do to avoid trouble.

Training should not end. It should be an on-going focus in your organization.

Passwords Part 1 Remind everyone that simple passwords are unwise. Does your company mandate a certain level of complexity in password creation? Maybe you should.

Passwords Part 2 - No password sharing. We tend to trust most of our colleagues, so when logging in and out seems a nuisance, we are often willing to let a peer use a database we’ve already logged into so they can do some simple, quick task. Not a good idea.

Email and phishing scams - These are really easy to fall victim to. Emails that look like they are from a legit source, so we open them up and then click on a link inside. Explain that emails can be made to look like what they aren’t. Always be suspicious. Look at the email address to see if the domain matches the legit site.

Odd links - If someone you know sent you a link to a site, unless you absolutely know the email is legit and the link is safe, let it go. Email them back to verify.

Lonely hardware - Remind everyone: Never, ever put a thumb drive into their computer unless they know where it came from. No matter how much one knows better, if you find a thumb drive sitting on a desk, it can be extremely tempting to plug it in to see what’s on it.
Don’t. Just don’t.

Comments

Popular posts from this blog

Why Migrate to the Cloud

Why Migrate to the Cloud If you haven't already considered migrating your data storage to the cloud, you are probably in the minority of businesses. While it may seem intuitive that somehow your data is safer if it is stored “ at home,” on location at the site of your business, that probably is not correct. Given the ability of skilled cloud service providers to provide redundancy and a level of security unattainable by a small business, storing all your crucial business data on site using in-house support is probably akin to keeping your money under the mattress instead of a bank. In this blog, we’ll explain what cloud data storage means, and some reasons why it may be a good business decision. In addition, we’ll quickly note some reasons some people get nervous about the security of cloud storage. What is cloud data storage? In an earlier time, a business would store all of its data on-site. Individual employees might keep all of their Word and Excel documents filed on their PC. ...

Leveraging your business data to drive better business outcomes

Leveraging your business data to drive better business outcomes Smaller firms may hear about AI and how data is driving the big corporations of the world, but they often don’t realize that they can do the same. The size and age of your business doesn’t have to be a limiting factor in whether you use data. Today’s blog is a quick look at data management for the small firm. The first lesson is: don’t take your data for granted. The basic business model for some large IT companies is monetizing the data that they collect. While this may not be your goal, you probably collect a great deal of data about your customers, prospects, and operations. An MSP can help you make better use of that data. Here are just three examples: Marketing Data tells you who is interested, when they're interested, and in what they are interested. Data can tell you where each individual prospect sits in the sales funnel, so your marketing messages reach them exactly where they are. It can also track the...

Protecting Your Data on the Cloud

Protecting Your Data on the Cloud Cloud storage has transformed the way businesses store and manage data, but for some, it also raises concerns about data protection. This blog post discusses a few security measures that can be deployed when using cloud storage. Data Encryption One of the fundamental security features of cloud storage is encryption. It ensures that your data remains confidential and protected from unauthorized access. Cloud storage providers use encryption algorithms to protect data both during transit and when stored in their servers. This means that even if an attacker intercepts the data in transit or gains access to the storage servers, the information remains unreadable. Encryption adds an extra layer of security, ensuring that your data remains confidential and secure. Access Controls and Identity Management Concerned about access to data? Cloud storage providers offer access controls and other mechanisms to prevent unauthorized access to your data. These feature...