It seems we can’t go more than 24 hours without hearing about the latest and greatest data breach affecting millions. These headlines are worrisome and has lead to many sleepless nights for business leaders at small and medium-sized businesses.
At the heart of any effective cybersecurity posture lies well-developed security policies and plans. You need these documents to demonstrate to stakeholders and employees how your company protects itself and its information technology assets. Safeguarding your most precious information assets is not just a job for hardware and software. It's also the responsibility of staff to be part of the solution. This can be accomplished by setting clear and effective password policies.
"PHISHING ATTACKS PREVALENT AMONG SMALL AND MEDIUM-SIZED BUSINESSES"
Does this common headline make you wonder if you have taken the right steps to protect your small and medium-sized business (SMB)? Let's assume you have a robust firewall, up-to-date antivirus, and a current patching program. Your remote employees are working from a private VPN, ensuring secure network access. You've created a password policy requiring complex passwords that must be changed frequently. And recently, you've implemented multi-factor authentication (MFA), adding extra security against compromised credentials. If this describes your network security, then you are on the right track, but have you considered the human element?
Most businesses have some form of a wireless network (WiFi) in place, but is it really necessary to set up a separate guest wireless access? There are a few good reasons why this is an important step to take. We know having WiFi is imperative for employees who move throughout the office, but it also makes sense to offer wireless access to your guests, customers, vendors, and auditors. It's a cybersecurity best practice to set up a guest wireless network that is segregated from the corporate network, and here's why.
The prevalence of video conferencing is changing the way we conduct business. As we adapt to this new meeting practice, cybercriminals are adapting as well. The recent surge in use of cloud-based video conferencing technologies creates opportunities for cybercriminals to reengineer their phishing tactics.
Every morning we log on to our corporate email and begin the day sifting through a myriad of messages, most of which are equally important and needing action. Likely, you haven't even finished your first cup of coffee and not focused on the cybercriminal who is hoping you will react to their highly sophisticated phishing email waiting in your Inbox. So how do you recognize and react to the myriad of fake emails coming at you multiple times a day?
If you haven’t heard the term “SD-WAN” (software-defined wide area network) by now, you’re either awakening from a two-year coma, or you haven’t been paying close attention to the onslaught of demonstrative offers, vendor emails, and introductory phone calls likely thrown in your direction.
The topic of SD-WAN has become the moniker for “building your company’s next WAN design." Needless to say, the term is out there as a hot topic, information is readily available, and most people feel that SD-WAN will be a positive disruption over the next three to five years. Due to the fact that clients want to build a better WAN experience with the benefit of lower costs, this makes perfect sense. Let's explore.
Has anyone at your organization ever received an email that was not what they thought it would be? Maybe it was a message from a vendor looking to verify sensitive account information; a message from an accountant sending completed tax returns in the month of August; or, a note from what appears to be from your healthcare insurance company asking you to confirm your date of birth in order to process a claim?
Have you ever been responsible for moving your organization from one office space to another? If so, you know the burden of everything that needs to be thought of; from decor, to furniture, to kitchen space and, most importantly, technology. After all, technology is what keeps the business running, whether it's corresponding with your clients, maintaining your core business applications, or just ensuring monitors turn on the first morning after the big move.
By now, it’s not a well-kept secret that IT security is an important consideration in the design and operation of an organization’s network. A lot of things can be centrally managed by your IT administrator, like maintaining current anti-virus software, delivering timely operating system security updates, and web content filtering.