ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Building Up Four Business Security Basics

Tip of the Week: Building Up Four Business Security Basics

With all the threats that stand to create problems for your business, it can be surprising to hear that some of your biggest security risks actually derive from your staff, and their exposure to your technology. Less surprising to hear: security issues interfere with the successful operation of your business. Here, we’ve shared a few tips to help your staff better adhere to security practices.

Password Etiquette

Passwords are used everywhere these days, in both personal and professional environments. You should encourage your employees to adopt the following practices and do the same yourself.

  • Differentiate your passwords. Let’s face it - people can be lazy at times, which contributes to the unfortunate habit of using the same username/email and password for every online account. The trouble with this habit is that if one account is compromised, a lot of other accounts could also be… all the person responsible has to do is plug in those credentials on other popular websites or business applications.
  • Keeping it simple is stupid. Another habit that we all tend to gravitate toward is to make a password as memorable as we can… which often means that our passwords usually include something about us that is easy to find out - pet names, birthdays, and other details like that. How often have you seen a movie where the hero hacks into a bad guy’s laptop by looking at a picture that the bad guy has on their desk of their pet, or remembering some other important details? This is so common, there is an entire storytelling trope around this phenomenon. Avoid doing this.
  • Give passphrases a try. Passphrases have grown in popularity recently as an alternative to passwords that are both easier to remember and more secure than the recommendation of assorted alphanumerics. What would you remember more easily: “4n89Gk99q,” or “farmcakemeeting?” 
  • Use a password manager. To be fair, remembering a unique password (or even passphrase) for all of the accounts that the average person has nowadays is a pretty extreme expectation, and contributes to people reusing passwords across accounts for fear of forgetting them. A password manager is a secure program that saves passwords for a user, meaning that the user really only needs to remember the one that opens the manager.

Safe Browsing

A lot of threats out there are designed to fool a user into opening up their network to attack. This can be avoided through the adoption of a few best practices amongst your staff.

  • Look twice at the URL. URLs are shockingly easy to disguise, so a malicious link could very easily appear to be something that you would click with almost no hesitation. Take www.google.com. If you were to click on a link that looked like this, you’d expect to be brought to the Google homepage, right? However, it is only too easy to use these expectations to mislead you and your users, as demonstrated here. One handy trick to use in this situation is to hover your cursor over a link, but not click on it. This will cause the actual destination of the link to appear at the bottom of your browser window.
  • Business computers should never be business-casual. Some threats to your business can hide on websites that will attack when you download materials from them, or even just when you visit them. Therefore, a work device should only be used for work-related tasks, if only to minimize this risk.
  • Leverage access controls and content filters. Of course, you shouldn’t necessarily put all of your faith in the reliability of your staff to make good choices. Even if they are putting forward their best effort to avoid online threats, accidents happen, so you should compound whatever efforts your team is putting forth with additional protections, like firewalls and content filters.
  • Trust the pros. No matter how simple an issue might seem on the surface, it pays to enlist the help of an IT professional for assistance if you have to resolve an issue.

Prevent Phishing

Phishing is a very effective means for cybercriminals to get their way, making it a common precursor to larger threats. Therefore, you and your staff alike need to be able to spot a potential attack:

  • Urgency is a warning sign. Consider emergency signs: are there nondescript recommendations to please proceed thusly in an orderly manner? Of course not--there are bold colors and simple, urgent instructions to get people to act quickly. Phishing messages use a similar tactic to make their targets panic and act impulsively.
  • Details are wrong. While this isn’t always the case, phishing messages can sometimes include misspelled words and odd grammatical choices. Links may not go where they appear to go. Take a few moments and double-check that links are correct by hovering your cursor over them and reviewing the URL that pops up.
  • Check for legitimacy. If you find a message suspicious, and you have the means to double-check it through another means of communication, do so. The inconvenience of a quick call is far less severe than the ramifications of a security breach.
  • Be quick to judge. If you can’t determine if a message is phishy or not, err on the side of caution. Report to IT and inform them of the message, then follow their guidance.

Data Security

Finally, we come to your data. Depending on your particular industry, the data you collect and store could potentially be quite valuable. A cybercriminal could actually make anywhere from $40 to $200 per record by selling sets of a person’s name, address, phone number, and credit history on the Dark Web. Bank details can bring in anywhere from $50 to $200 each. If your business is the source of that information, you could be in serious trouble… and that’s without even considering all of the other consequences. Your data needs to be secured, so a few practices will help you to do so:

  • Restrict data access. You need to maintain some pretty considerable authentication measures so your data is secured both digitally and physically. Access controls and authentication measures should be imposed on both sides of the coin, greatly reducing the risk of a breach or a leak.
  • Update your security. Cybercriminals are always busy trying to devise new methods of undermining your business’ security, and cybersecurity developers are always responding in kind. So, as patches and updates are released for new and developing threats, you need to make sure that you are appropriately putting them in place.
  • Regulatory compliance. Regulations are in place for many industries that are intended to maintain cybersecurity standards, including the Payment Card Industry Data Security Standard (PCI DSS) and the assorted data privacy laws that have recently been adopted. If you aren’t compliant, you need to fix that as soon as possible.
  • Backup your data. Whether it is due to a malicious effort or simple bad luck, data loss is one of the worst things that can happen to a business in terms of its survival. Insulate yourself by maintaining at least a cloud-based backup.

Following these considerations can greatly contribute to the security of your business and its operations, but there is still more that you can (and need to) do. Reach out to ClearView IT at 866-326-7214 for help in enacting all of them, and more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Data Backup Ransomware communications Smartphone Small Business Microsoft Office Upgrade Smartphones Network Mobile Devices Communication Data Recovery Managed IT Services Quick Tips Productivity VoIP Users Social Media Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Disaster Recovery Passwords Covid-19 Holiday Managed Service Windows 10 Apps IT Support Browser Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Data Management Internet of Things Remote Work Operating System Government Saving Money Managed IT services Windows Gadgets Networking Artificial Intelligence Workplace Strategy App Virtualization Information Spam Server Mobile Device Management Bandwidth Blockchain Encryption WiFi Remote Business Technology Gmail Employee/Employer Relationship Office Two-factor Authentication Budget Office 365 History Apple Information Technology Conferencing Big Data Wi-Fi Access Control Data Security Health Cybercrime Analytics BDR IT Management Help Desk Training Save Money Hacking Voice over Internet Protocol Vendor Employer-Employee Relationship Hacker Patch Management Cost Management Remote Monitoring Compliance Remote Computing Document Management Data storage Applications Search... Mobile Office Best Practice BYOD Managed Services Money Vulnerabilities Computing Retail Vendor Management Customer Service Alert Unified Threat Management Hard Drive Firewall Project Management Hiring/Firing Outlook Augmented Reality Word Password Legal Data loss IBM Website Google Maps Scam The Internet of Things Travel YouTube Windows 11 Mobile Computing Virtual Reality Social Engineering Data Breach Cryptocurrency VPN Marketing Black Market Running Cable Laptop Remote Workers Cleaning Update Robot Storage Windows 7 Free Resource Monitoring Paperless Office How To Sports Antivirus Social Healthcare SaaS DDoS Maintenance User Twitter iPhone Education Cortana Law Enforcement End of Support Websites Content Filtering Printer Meetings Mobility Chrome Router Notifications Unified Communications PowerPoint Cooperation Video Conferencing Administration Virtual Assistant Google Docs Bluetooth Virtual Machines Presentation Distributed Denial of Service Computer Repair Specifications Office Tips IT Consultant Private Cloud Memory Professional Services Tech Terms Wireless Technology Customer Relationship Management eWaste Processor Managed IT Co-Managed IT Digital Entertainment Managed Services Provider Downtime Politics Machine Learning Settings Safety Taxes Virtual Private Network Solid State Drive Virtual Desktop Multi-factor Authentication Experience Current Events Solutions Physical Security Saving Time Chromebook Drones HIPAA Automobile Images 101 Integration Display Disaster Bitcoin Computers How To Telephone Start Menu Computer Care Microchip Downloads Employees Lithium-ion battery Flexibility Vulnerability Avoiding Downtime Excel Holidays Software as a Service Hack Identity Theft Processors Data Protection Virtual Machine Securty Tip of the week Supercomputer Fileless Malware Google Calendar Reviews Gamification Optimization Company Culture Virus Smart Technology Domains Scalability Motion Sickness Administrator 2FA Telephone System Text Messaging Regulations Proactive IT Teamwork Electronic Payment Hypervisor Google Drive Directions Bring Your Own Device Data Storage Backup and Disaster Recovery Comparison Shopping Content Desktop Medical IT Paperless Electronic Medical Records Accountants Music Knowledge SQL Server Corporate Profile Television Licensing Telephony Phone System Public Speaking Employer Employee Relationship PCI DSS Database Gig Economy Humor Streaming Media Supply Chain Cabling Tablet Keyboard G Suite Botnet Business Communications Health IT Internet Service Provider Equifax Azure Tactics Micrsooft Mouse Managed IT Service Hard Drive Disposal VoIP Hard Drives Tracking Rental Service Regulations Compliance Username Flash Memes Workplace intranet Wireless Freedom of Information Computer Accessories Shortcut Web Server Human Resources Telephone Systems Net Neutrality Startup Business Growth Addiction SharePoint email scam Heating/Cooling Digital Payment Environment Navigation Financial Data Social Networking Risk Management IT Windows XP Mobile Security Scams Worker News Access Google Apps User Tip Banking Legislation Google Wallet Network Management Deep Learning Time Management Public Cloud Evernote Messenger Telework Smartwatch Communitications Microsoft 365 Cables Fake News Spyware Proxy Server Business Metrics Procurement Emails Hosted Solution Audit FinTech Service Level Agreement Computing Infrastructure File Sharing Books CES Management Language IT Assessment Device security Society Redundancy Troubleshooting Point of Sale Value Staffing Microsoft Excel Cache Supply Chain Management Wireless Headphones Organization Going Green Monitors Cyber security Business Cards Visible Light Communication Unified Threat Management Shortcuts IP Address Workers Tech Reading Error Smart Devices Windows 8 CCTV Bookmark Remote Working Printing AI Download Displays Trend Micro Piracy Advertising Touchscreen Be Proactive Term Relocation Computer Malfunction Digital Security Cameras Work/Life Balance Electronic Health Records HTML Tech Support Emergency Business Owner Transportation Wasting Time Recovery Vendor Mangement Competition Browsers Nanotechnology Upload eCommerce Software License Modem Workplace Strategies Samsung Google Play Entrepreneur Webcam In Internet of Things Videos Social Network Surveillance LiFi Uninterrupted Power Supply Managing Costs Documents Business Mangement Application Data Analysis Hacks Screen Reader Network Congestion Trends Writing Mobile Technology SSID Tablets Business Intelligence Security Cameras Reliable Computing Media Customer Resource management Development Devices Inbound Marketing Employer/Employee Relationships

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?