WELCOME TO OUR BLOG
The time to start planning for a security threat is BEFORE a cyber-attack occurs…not during! Cyber-security planning should be done continuously, especially as your organization changes.
By proactively planning and adjusting, you can reduce the risk of significant consequences from technology incidents.
For any account that you care about protecting, we recommend you change your passwords about once every three months. It’s also important that you don’t reuse passwords or use the same passwords for two different sensitive accounts.
Do you have guest access on your company WiFi network separate from your main network? Or do you simply give out the same password and access point information that your employees use? If you give out your password, you’re allowing a guest to play in the same sandbox where your staff accesses sensitive data. What if your guest, knowingly or unknowingly, has been infected with some kind of worm?
Every organization needs to ask a fundamental question about their staff: Do they know what to do immediately upon discovering a virus, e-mail threat or other cyber-security issue?
Getting rid of old computers or servers? Did you know that the components used in technology equipment are not landfill-safe? On top of the environmental hazards, unprotected e-waste typically contains a lot of confidential and private information.
Password complexity is a given in the current age of cyber-threats, data breaches and other security incidents. At the same time, it can be very difficult to manage a series of different passwords for different websites and devices.
Do you connect remotely to get some work done in the evenings, weekends or when on the road? For many, the answer is yes. Technology has provided us with so many ways to be productive anytime and anywhere.