Cloud security tips and tricks from Benjamin Dynkin today? Anyone who wants to do your company harm can infiltrate in a number of ways — through your computer network or your website, using phony emails or other scams to obtain account names, passwords and other sensitive information. It used to be enough to protect the data that existed within the physical walls of your business, but that’s no longer sufficient. Many businesses don’t even have physical walls anymore: They might exist entirely on the Internet, with employees working independently all over the globe. On top of protecting your own systems, you also have to protect your customers’ information. And the laptops and smartphones that make our lives easier also present new and challenging security issues. See even more information on https://about.me/bendynkin/.
Make Sure Employees Look for the S in HTTPs When Searching the Web. Employees will, from time to time, use the corporate IT network to visit websites or sign up for services, either for personal use or for the company. Before submitting any information, they should always be on the lookout for the padlock and HTTPS in the address bar. If the site is unprotected, they should not enter any information. Note: It’s important to also educate employees on phishing websites (see tip 15 below). There have been cases of phishing websites using Domain Validated (DV) SSL Certificates to make their sites look more “real” and “trustworthy”.
Install Anti-Virus Protection. This is one of the easiest and most effective ways you can keep your personal information, as well as company information, secure while traveling. In addition to using a trusted brand of security, make sure that you regularly update this software as new versions become available. Just like your anti-virus software, you should keep your operating system as current as possible. This also goes for apps on your phone; take special care to update apps that you regularly use to conduct financial or personal business.
Backing up your data regularly is an overlooked step in personal online security. The top IT and security managers follow a simple rule called the 3-2-1 backup rule. Essentially, you will keep three copies of your data on two different types of media (local and external hard drive) and one copy in an off-site location (cloud storage). If you become a victim of ransomware or malware, the only way to restore your data is to erase your systems and restore with a recently performed backup. Don’t use a public Wi-Fi without using a Virtual Private Network (VPN). By using a VPN, the traffic between your device and the VPN server is encrypted. This means it’s much more difficult for a cybercriminal to obtain access to your data on your device. Use your cell network if you don’t have a VPN when security is important.
Benjamin Dynkin and Atlas Cybersecurity about data breaches: Malicious criminals tend to follow a basic pattern: targeting an organization for a breach takes planning. They research their victims to learn where the vulnerabilities are, such as missing or failed updates and employee susceptibility to phishing campaigns. Hackers learn a target’s weak points, then develop a campaign to get insiders to mistakenly download malware. Sometimes they go after the network directly. Once inside, malicious criminals have the freedom to search for the data they want — and lots of time to do it, as the average breach takes more than five months to detect. In many cases, data breaches cannot just be patched up with some password changes. The effects of a data leak can be a lasting issue for your reputation, finances, and more.