Our Blog: Stuff we think you should know

Solid Network Security Requires Vigilance

Solid Network Security Requires Vigilance

When all is said and done, your business’ success relies in no small part on how secure you keep it, and in order to be secure, you need to know what threats are apt to target your business. Below are four of the biggest concerns that you need to be sure that your security implementations address.

Password Pitfalls
Passwords can be a very effective tool for maintaining data security, assuming that they have been created properly, with best practices in mind. For instance, a password shouldn’t be used for more than one account. It’s bad enough to have to deal with a single account being stolen, let alone access to all of your accounts.

Furthermore, you need to strike a balance between your password being easy to remember and difficult to guess. While you don’t want it to be too easy for someone else to puzzle out, it also wouldn’t help you much if you kept forgetting it, either. This is why a passphrase is a useful alternative. A passphrase is exactly what it sounds like: instead of relying on a word to secure access to an account, you utilize a phrase. Basic substitution can also help boost your security as well.

So, instead of using “dorothy” or a random series of letters and numbers, a Wizard of Oz fan might use “&Ur1i++leD0g2.”

Malicious Mobile Apps
Not all applications are created equal, and we’re talking about more than just their quality. While the official app marketplaces attempt to weed out any potentially threatening downloads, there are no such hurdles for those apps found outside these official channels. This makes them particularly risky to download.

Of course, that isn’t to say that an app downloaded from the official marketplace is guaranteed to be safe, either. Plenty play fast and loose with a user’s data, so make sure you check what permissions you give them. Does it make sense for an app to need access to a particular piece of data? If not, you may consider giving that app a pass.

Phony Phishing
Cybercriminals don’t always have to resort to breaking into a system in order to accomplish their goals. Instead, they can use deception and a user’s own expectations to manipulate them into acting against their own self-interests. These efforts are referred to as phishing.

Phishing scams can appear in many forms, from the classic Nigerian Prince example to the many that appear today asserting that a victim’s systems have been compromised, only to compromise them once access is granted. Fortunately, there are a few ways that these attacks can be avoided through observation and diligence.

It is important that you and your staff keep an eye out for any inconsistencies in messages that come in. If there ever is a cause for suspicion, confirm the message through a secondary means of communication. While it may be a pain, it would be much worse to be on the receiving end of a successful phishing scam.

Wi-Fi Worries
Wireless Internet functionality has enabled businesses to move away from the desktop workstation, allowing business to be conducted with more mobility and convenience. However, just as Wi-Fi has created more opportunities for businesses, it has given cybercriminals more opportunities as well.

Whether you’re in your office or on the road, there are certain precautions you need to take to ensure you can connect safely. Your office’s connection needs to be properly secured, which means that you need to change the credentials on your equipment. Many people just keep the default access codes on things like routers, which makes them the ideal target for an opportunistic hacker. Likewise, public Wi-Fi connections are also highly prone to cybersecurity issues, and should therefore be used only with a virtual private network protecting your activity.

Haber Group can offer the expertise and assistance to protect your network against all kinds of threats. For more information, reach out to us at 866.625.3560.

Tech Terminology: Mobile Device Management
Productivity in the Age of Distraction
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, June 17 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business User Tips Malware Microsoft Computer Business Computing Productivity Hosted Solutions Google Network Security Software Internet Tech Term Data Communication IT Services Small Business Ransomware Backup Mobile Devices Efficiency Workplace Tips Hardware Windows 10 Smartphone Cloud Computing Microsoft Office Android Saving Money Data Recovery IT Support Productivity Gmail Data Management Facebook Browser Business Continuity Upgrade Social Media Managed IT Services Innovation Managed IT Services Windows Mobile Device Data Backup Server Users Office 365 Phishing Internet of Things Information Word Outsourced IT App Passwords Windows 10 Disaster Recovery Smartphones Encryption Network Chrome Vulnerability Cybersecurity Artificial Intelligence Miscellaneous communications Business Management Managed Service Provider VoIP Remote Monitoring Employer-Employee Relationship Office Tips Save Money Virtual Reality Hacker Apple Gadgets Tip of the week Analytics Content Filtering Spam IT Support Big Data Website Managed Service Government Money Apps Infrastructure BYOD Applications Customer Service Augmented Reality IT Management WiFi Avoiding Downtime Maintenance The Internet of Things Settings Two-factor Authentication Tablet Data storage Paperless Office Virtualization Display Bandwidth Antivirus YouTube Employee-Employer Relationship Unified Threat Management VPN Education Robot Risk Management Access Control Router Wireless Printing Automation Firewall Google Drive Laptop Password Mobile Security Document Management Touchscreen Mouse Vendor Management Telephone Systems Presentation LiFi Safety Computers Office Quick Tips Business Intelligence Storage Downtime Scam Wireless Technology Recovery Retail Hosted Solution SaaS Solid State Drive Company Culture Networking Outlook Hard Disk Drive Monitors Holiday Search IBM Data Security HIPAA Data loss Business Technology Chromebook Mobile Device Management Development Virtual Private Network Administration Operating System Customer Relationship Management End of Support Hacking Server Management Bring Your Own Device Wi-Fi Computing Specifications Compliance Lithium-ion battery Charging Mail Merge Value Tech Support IT solutions Smart Office Co-Managed IT Downloads IT Technicians File Sharing Wires Software as a Service Disaster Shortcut Bitcoin Network Congestion Online IoT Computer Care Digital Signage Unified Threat Management Solar Print Toner Statistics Best Practice telephony Break Fix Cookies Samsung 5G Monitoring Hard Disk Drives Spyware Superfish Information Technology Cooperation Google Docs Black Friday Regulations Halloween Messaging Address Writing Undo Hotspot Professional Services Websites Identity Theft Cortana Work Content Multi-Factor Security Mirgation Voice over Internet Protocol Entertainment Uninterrupted Power Supply Patch Management Windows 8 Marketing Microsoft Excel Star Wars Training Fun Desktop User Error Shortcuts Bluetooth Business Growth Application Dark Web Nanotechnology G Suite Spying Solid State Drives Google Wallet Staff Automobile Cyber Monday Social Networking Scary Stories Analysis Employee-Employer Relationships Corporate Profile Current Events Language USB Optimization Streaming Google Calendar Chatbots IP Address Cybercrime FinTech iOS Blockchain Cost Management Troubleshooting VoIP Legal Security Cameras Alt Codes Dark Data Net Neutrality Screen Reader National Security How To Drones Printer Wearable Technology IT service Heating/Cooling Smart Technology Motherboard Remote Computing Sports Students WannaCry Going Green Social Engineering Computing Infrastructure Dongle Knowledge Recycling Human Error Legislation Identity Update Mobile Office MSP Scalability Social Hard Drives Permissions Assessment Time Management Managing Stress Managed Services Cabling Typing FCC Smart Tech PowerPoint Firefox eWaste Device BDR Servers Deep Learning Humor Distributed Denial of Service Mixed Reality Alerts Service Level Agreement Digital Payment Experience Unified Communications User Comparison Running Cable Migration Hacks Refrigeration Fraud Internet Exlporer Politics LED Network Management Collaboration Cables Laptops Managed IT Cryptocurrency Title II Connectivity Virtual Desktop Onboarding Techology Budget Public Speaking SharePoint Continuity Mobility Google Maps sip Managed IT Service Modem Buisness Slack Data Breach Digital Lenovo How To Competition Licensing Private Cloud Emoji Webcam Windows 7 Electronic Medical Records Work/Life Balance Error Black Market Point of Sale Regulation Mobile Computing Travel Law Enforcement Physical Security Notifications CrashOverride Upgrades Twitter Botnet Supercomputer Motion Sickness Gadget Staffing Crowdsourcing Taxes 3D Printing Personal Information Administrator Web Server Emergency Machine Learning IT Budget GPS Printers Computer Repair IT Consultant Updates Unsupported Software Domains Processors Cameras Relocation Meetings Tracking Health Cleaning Mobile Data Alert CCTV