Security & Education Matters
Ten CyberSecurity Tips for Small Businesses
Broadband and information technology are powerful factors in small businesses reaching new markets and increasing productivity and efficiency. However, businesses need a cybersecurity strategy to protect their own business, their customers, and their data from growing cybersecurity threats. Here are ten key cybersecurity tips for businesses to protect themselves:
1. Train employees in security principles
Establish basic security practices and policies for employees, such as requiring strong passwords, and establish appropriate Internet use guidelines that detail penalties for violating company cybersecurity policies. Establish rules of behavior describing how to handle and protect customer information and other vital data.
2. Protect information, computers and networks from cyber attacks
Keep clean machines: having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats. Set antivirus software to run a scan after each update. Install other key software updates as soon as they are available.
3. Provide firewall security for your Internet connection
A firewall is a set of related programs that prevent outsiders from accessing data on a private network. Make sure the operating system’s firewall is enabled or install free firewall software available online. If employees work from home, ensure that their home system(s) are protected by a firewall.
4. Create a mobile device action plan
Mobile devices can create significant security and management challenges, especially if they hold confidential information or can access the corporate network. Require users to password protect their devices, encrypt their data, and install security apps to prevent criminals from stealing information while the phone is on public networks. Be sure to set reporting procedures for lost or stolen equipment.
5. Make backup copies of important business data and information
Regularly backup the data on all computers. Critical data includes word processing documents, electronic spreadsheets, databases, financial files, human resources files, and accounts receivable/payable files. Backup data automatically if possible, or at least weekly and store the copies either offsite or in the cloud.
6. Control physical access to your computers and create user accounts for each employee
Prevent access or use of business computers by unauthorized individuals. Laptops can be particularly easy targets for theft or can be lost, so lock them up when unattended. Make sure a separate user account is created for each employee and require strong passwords. Administrative privileges should only be given to trusted IT staff and key personnel.
7. Secure your Wi-Fi networks
If you have a Wi-Fi network for your workplace, make sure it is secure, encrypted, and hidden. To hide your Wi-Fi network, set up your wireless access point or router so it does not broadcast the network name, known as the Service Set Identifier (SSID). Password protect access to the router.
8. Employ best practices on payment cards
Regularly backup the data on all computers. Critical data includes word processing documents, electronic spreadsheets, databases, financial files, human resources files, and accounts receivable/payable files. Backup data automatically if possible, or at least weekly and store the copies either offsite or in the cloud.
9. Limit employee access to data and information, limit authority to install software
Do not provide any one employee with access to all data systems. Employees should only be given access to the specific data systems that they need for their jobs, and should not be able to install any software without permission.
10. Passwords and authentication
Require employees to use unique passwords and change passwords every three months. Consider implementing multi-factor authentication that requires additional information beyond a password to gain entry. Check with your vendors that handle sensitive data, especially financial institutions, to see if they offer multi-factor authentication for your account.
Is Your Credit Card Safe, Are you vulnerable?
Yes, you might be if you are not aware!
Credit card fraud happens in analog, digital ways, or a combination of the two: ONLINE and OFFLINE.
But how? How do crooks get your card number?
Getting Your Card Number
There are several methods to accomplish this, and they range from the most naïve to the most technologically savvy methods.
Computer Scientists define a method called “Phishing”. It is an old strategy that only requires a crook to be a smooth talker. They’ll call you via phone, sends a text message, or even an email. They will pretend to be from your credit card company to talk you into giving them your credit, and credit card information. Some of these crooks are really smooth!
Online data intrusion is another method. There are articles and recent news of intrusion on most common US retail companies. The stolen information is “wholesaled” by crooks where like minded criminals go to shop for stolen credit and credit card information.
Could yours be one of these?
If a crook manages to get a form of malware that key logs your activities on your computer installed while you are not aware, it’s over!!
There is an increase in contactless payment credit cards, Radio Frequency Identification (RFID) scanners have become a more popular method to steal credit card information; all the crook needs to do is get a scanning device in close range to your card, and they’ll have all the information they need.
A similar method called “skimming” requires a thief to have a physical scanner that reads the information from your credit card. And, of course, there’s the most time-tested, old-fashioned way: just stealing the card.
How to Protect Yourself from Credit Card Fraud
First, don't fall a victim of “Phishing”. Don’t give or share your credit card information with anyone over the phone, email, or text message. DO NOT share your card information over the phone or in an email. Banks and Credit Card Companies normally do not do this.
Second, pay attention to your social media instruments: Online news, television reports or a retail outlet or banks notifications. When these companies get intruded on, they usually take responsible steps informing their card holders. Please respond to their instructions immediately.
Next, get a RFID blocking wallet if you use a RFID equipped card.
Next, be alert when giving a cashier your credit card, study the machine briefly (if you can) to see if it looks tampered with. If it walks like a duck, talks like a duck, it’s got to be a duck.
Finally, monitor your credit and bank statements regularly. The earlier you catch a crook, the better for you.
There are a lot of different ways that crooks can obtain and use your credit card information—it might seem like it’s impossible to protect yourself. You can follow a few simple methods that can significantly decrease the chances that you’ll fall victim.