Contact us today!

Network Solutions Unlimited Blog

Maybe You Can’t Fix Stupid, but You Can Fix Your Security

Maybe You Can’t Fix Stupid, but You Can Fix Your Security

It’s easy to dismiss network security if you run a small business that seemingly isn’t a target of malicious attacks. Unfortunately, this dismissive attitude can put your organization at risk, as even a simple security issue could be enough to expose your company to dangerous entities. In fact, we would call it foolish not to secure your organization; and one of the most infamous security failings in history stems from this.

The Equifax Problem
During the months of May and July of 2017, a credit-reporting firm called Equifax fell victim to a data breach that exposed a whopping 148.1 million records containing personally identifiable information. To put this in perspective, the Equifax data breach exposed almost half of the population of the United States of America.

In the wake of this breach, the former Equifax CEO Richard Smith was cross-examined by Congress. Smith’s defense argued that “human and technology errors” were at the heart of the issue. Ultimately, the Chairman of the House Energy and Commerce Committee, Greg Walden, came to the following conclusion: “I don’t think that we can pass a law that fixes stupid.”

How to Fix Your Data Security
While it’s true that there is no guarantee legislation would resolve the issue, you still need to make sure that your organization is doing the best that it can to keep threats from infiltrating its network. You can begin by implementing specific standards on a company-wide level or a case-by-case level.

Here are some ideas that you can start with:

  • Start with compliance: Compliance regulations don’t always have data security in mind. That being said, it’s still an important part of managing your data security, as you could potentially be subject to fines and other troubling regulations.
  • Resolve vulnerabilities: 99 percent of exploits rely on vulnerabilities remaining unresolved in network infrastructures. These exploits also often exploit vulnerabilities that are at least a half a year old. You should make patching these vulnerabilities a priority so that you can best protect your data.
  • Centralize your data security: There needs to be someone at the helm of your data security endeavors. If there isn’t, you make protecting your data much more difficult. This person should be responsible for implementing access control and making sure that nobody can access data that they wouldn’t need for their ordinary workday.

Encouraging Employee Security
Employees hold more sway over your business’ security than they may realize. This makes it difficult to protect important assets, because if you’re overly cautious, you could be compromising your business’ ability to operate as intended. For your benefit, here are a couple of ways that your organization can help employees remain cognizant of their responsibilities.

  • Lazy credential habits: Password problems have persisted in business for a long time. Employees should never reuse passwords or usernames for every account that they have. Each password should be a complex, containing letters, numbers, and symbols to maximize security. You can use a password management system if this gets to be a bit too much for your employees.
  • Oversharing information: You should help your employees work toward limiting just how much information they share about themselves on social media so that passwords are not as easily predicted. Avoid using personal anecdotes whenever possible, and restrict who can see what information to minimize the chances of this happening. You also don’t want information to spread outside of the office, as an invoice or receipt with a customer number could be all a hacker needs to cause trouble.
  • Using the wrong Wi-Fi: Public Wi-Fi is dangerous and therefore, not the ideal way to access secure data. You should work together with your employees to make sure that they have secure access to company documents whenever they need them. A virtual private network is a great way to do this, as it encrypts information sent and retrieved by your devices.

Does your business need to augment security? Network Solutions Unlimited can help. To learn more, reach out to us at 217-428-6449.

Tip of the Week: Canned Responses can Streamline C...
Some of the Value that Cloud Computing Offers


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, January 22 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Smart Tech Humor Remote Monitoring Applications End of Support Admin IT Support Google Assistant Travel Virtual Private Network Legislation How To Business Data Recovery Techology Device Security Remote Computing Emails WIndows Server 2008 Remote Workers Paperless Office Law Enforcement Save Money Unsupported Software Training Wireless Technology Phone System Computers Internet Exlporer Managed IT Services Experience Nanotechnology MSP Automobile Chrome Printers Human Resources Two-factor Authentication Cloud Camera Streaming Media Facebook Personal Information Customer Devices User Error Thank You Technology Phishing IT budget Proactive IT Benefits Rootkit Network Security VoIP Managed Service Provider Safety Bluetooth Business Management Passwords Tablets Compliance Shadow IT Artificial Intelligence intranet Data Privacy Evernote Operating System Bring Your Own Device Politics Hard Drives USB File Sharing Electronic Medical Records Memory Wi-Fi Managing Stress Hosted Solutions Patch Management Hardware Users IT Solutions Save Time PDF Browser Financial Microsoft Office Cortana Gamification Information Computer Forensics Amazon Ciminal Data Loss Employer-Employee Relationship Solid State Drive Access Control Mobile Communication Instant Messaging Internet exploMicrosoft Licensing Managed IT Services Health Apps Software App store Mobile Device Management Cybersecurity Tech Term Money Testing HIPAA Saving Money Going Green Worker Financial Technology Identity Theft Sales Content Filter Websites Language Upgrade Charger Wasting Time Alexa for Business Document Management Scalability Black Market hacker Troubleshooting Privacy BDR VPN Computing Infrastructure IT Management Printing Gifts Fraud Office 365 Malware Antivirus Management Managed IT Battery Encryption Mobile Device Telephone Systems Professional Services Identity Smartphones Consultant Miscellaneous Keyboard CrashOverride Comparison Webinar Virtual Reality Ransomware Smart Technology Microsoft Word Google Drive HBO Work/Life Balance Projects Credit Cards Collaboration Reputation Budget Android Apple Public Cloud Vulnerability Business Owner Avoiding Downtime Big Data Touchscreen Windows 7 Monitor Update Twitter Workers File Storage Quick Tips Touchpad Windows 10s The Internet of Things Files Risk Management Entertainment Application OneNote Computing IT Service Machine Learning Firewall Private Cloud Disaster Recovery Vendor Mobile Devices Advertising iOS Internet of Things Search Smartphone Computer Excel IT Services Vendor Management Managed IT Service Cache Internet Data Security Router Marketing WPA3 Television Office Social Media How to Accessory Virtual Assistant Outsourced IT Students Emergency IT Support Monitors Display Assessment Data Management NFL Software as a Service Project Management Best Practices Upgrades Hackers Shortcut Tip of the Week PowerPoint Physical Security Social Engineering Chromebook Lifestyle eWaste Information Technology Security Cameras Administration BYOD Wasting Money Mobility Server Laptop Audiobook Specifications Alert Meetings Data Backup Chromecast Business Intelligence Content Sports Saving Time Edge Hard Disk Drive Windows 10 Loyalty Commerce Storage Company Culture Spam Blocking Small Business Innovation Computer Care Downtime Cost Management Regulation Peripheral Business Computing Data Breach IoT Samsung Spam Relocation Automation Screen Mirroring WannaCry Data storage Scam Backup Bandwidth User Tips Managed Service Holiday Hard Drive Payroll Microsoft Excel Data Theft Telephone Video Games Tech Support Cleaning Hacking Spyware Outlook Password IT solutions Data Hyperlink Unified Communications Education Robot Office Tips Word Congratulations History Productivity Keyboard Shortcuts App Proactive Transportation Microsoft HaaS Settings Gadgets Windows Ink Dark Web Employer Employee Relationship Wireless Public Computer Business Continuity Cast Sync Recovery Network Virus Audit Cybercrime Security Hiring/Firing SMB Maintenance Redundancy Colocation Data Storage Connectivity Root Cause Analysis Books Efficiency Windows Virtualization Hosted Solution Co-Managed Services Gmail Wireless Charging Wireless Internet Blockchain Conferencing SaaS Updates WiFi Unified Threat Management Legal Google Docs Worker Commute Email Identities Cloud Computing Windows 10 Data Protection Mobile Security Best Practice iPhone Business Technology Hybrid Cloud Flexibility Workplace Tips Productivity Google Computer Fan Government Google Maps Utility Computing Two Factor Authentication Augmented Reality Computer Accessories Adobe Employee-Employer Relationship Analysis Retail Communications Networking FAQ Value Monitoring Content Filtering