Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Maybe You Can’t Fix Stupid, but You Can Fix Your Security

Maybe You Can’t Fix Stupid, but You Can Fix Your Security

It’s easy to dismiss network security if you run a small business that seemingly isn’t a target of malicious attacks. Unfortunately, this dismissive attitude can put your organization at risk, as even a simple security issue could be enough to expose your company to dangerous entities. In fact, we would call it foolish not to secure your organization; and one of the most infamous security failings in history stems from this.

The Equifax Problem
During the months of May and July of 2017, a credit-reporting firm called Equifax fell victim to a data breach that exposed a whopping 148.1 million records containing personally identifiable information. To put this in perspective, the Equifax data breach exposed almost half of the population of the United States of America.

In the wake of this breach, the former Equifax CEO Richard Smith was cross-examined by Congress. Smith’s defense argued that “human and technology errors” were at the heart of the issue. Ultimately, the Chairman of the House Energy and Commerce Committee, Greg Walden, came to the following conclusion: “I don’t think that we can pass a law that fixes stupid.”

How to Fix Your Data Security
While it’s true that there is no guarantee legislation would resolve the issue, you still need to make sure that your organization is doing the best that it can to keep threats from infiltrating its network. You can begin by implementing specific standards on a company-wide level or a case-by-case level.

Here are some ideas that you can start with:

  • Start with compliance: Compliance regulations don’t always have data security in mind. That being said, it’s still an important part of managing your data security, as you could potentially be subject to fines and other troubling regulations.
  • Resolve vulnerabilities: 99 percent of exploits rely on vulnerabilities remaining unresolved in network infrastructures. These exploits also often exploit vulnerabilities that are at least a half a year old. You should make patching these vulnerabilities a priority so that you can best protect your data.
  • Centralize your data security: There needs to be someone at the helm of your data security endeavors. If there isn’t, you make protecting your data much more difficult. This person should be responsible for implementing access control and making sure that nobody can access data that they wouldn’t need for their ordinary workday.

Encouraging Employee Security
Employees hold more sway over your business’ security than they may realize. This makes it difficult to protect important assets, because if you’re overly cautious, you could be compromising your business’ ability to operate as intended. For your benefit, here are a couple of ways that your organization can help employees remain cognizant of their responsibilities.

  • Lazy credential habits: Password problems have persisted in business for a long time. Employees should never reuse passwords or usernames for every account that they have. Each password should be a complex, containing letters, numbers, and symbols to maximize security. You can use a password management system if this gets to be a bit too much for your employees.
  • Oversharing information: You should help your employees work toward limiting just how much information they share about themselves on social media so that passwords are not as easily predicted. Avoid using personal anecdotes whenever possible, and restrict who can see what information to minimize the chances of this happening. You also don’t want information to spread outside of the office, as an invoice or receipt with a customer number could be all a hacker needs to cause trouble.
  • Using the wrong Wi-Fi: Public Wi-Fi is dangerous and therefore, not the ideal way to access secure data. You should work together with your employees to make sure that they have secure access to company documents whenever they need them. A virtual private network is a great way to do this, as it encrypts information sent and retrieved by your devices.

Does your business need to augment security? Network Solutions Unlimited can help. To learn more, reach out to us at 217-428-6449.

Tip of the Week: Canned Responses can Streamline C...
Some of the Value that Cloud Computing Offers
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, June 24 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

CrashOverride Politics Information Technology Wireless Smartphones Social Media Business Computing App Password Public Computer Antivirus Mobility BYOD Monitors Upgrade Managed IT Innovation Chromebook Big Data Scalability Safety Conferencing Hybrid Cloud Bandwidth Computing Infrastructure Mobile Assessment Wireless Internet Internet Internet exploMicrosoft Bluetooth Virtualization Efficiency Social Engineering Software Cybercrime Specifications PowerPoint Best Practices Credit Cards Shadow IT User Error Rootkit Licensing Network Word Operating System Root Cause Analysis Automation Network Security Analysis Excel Managed Service Provider Edge Nanotechnology Webinar Office 365 Colocation Devices Hiring/Firing Hardware Wireless Charging Tech Term Cost Management Robot User Tips Cleaning Websites Smart Tech Data Management Memory Proactive Managing Stress Gifts Microsoft Office Data Backup Project Management Facebook Hosted Solutions Internet Exlporer Settings Mobile Security File Sharing Hacking hacker How to Education Data Privacy Remote Computing Collaboration Health Language Privacy Shortcut Audiobook Business Management Training Office Tips Comparison Going Green Browser Techology Meetings Artificial Intelligence Avoiding Downtime Small Business Cloud Printing Holiday Consultant Travel iOS Outlook Vulnerability Windows 10s Remote Monitoring Management Streaming Media Upgrades Google Software as a Service Smart Technology Update Charger Hard Drive Augmented Reality Quick Tips Screen Mirroring IT budget Data Google Docs Worker Books Advertising Legal Business Continuity Managed IT Services Students Battery Blockchain App store Google Assistant IT Solutions Hackers Cache Worker Commute The Internet of Things Identity Theft Search Phone System VoIP IT solutions Alert Fraud Mobile Device Commerce BDR Malware Computer Solid State Drive IT Support FAQ Unified Threat Management Transportation Users HIPAA Windows Ink Adobe Automobile Proactive IT Document Management Government VPN Troubleshooting USB Laptop Managed IT Services Legislation Email Wi-Fi Computers Employer-Employee Relationship IT Services Recovery Budget Cloud Computing Thank You Monitoring Data Protection Data Breach Firewall Router Updates Private Cloud Computer Care Ransomware Sales Business Employer Employee Relationship intranet Computer Forensics Loyalty Communication Emails Financial Technology Benefits Smartphone Microsoft Word Identity Professional Services Spam Downtime Humor Video Games Congratulations Spam Blocking Encryption Physical Security Relocation Tablets Identities Instant Messaging Retail Managed IT Service Lifestyle Sync Emergency Entertainment Windows Virus Unsupported Software SaaS Technology Hosted Solution Saving Money Samsung Content Filter Gmail Two Factor Authentication IT Support Content Filtering Hard Disk Drive End of Support Internet of Things Monitor Tip of the Week Vendor Management WiFi Gamification Content Data Security Mobile Device Management Spyware WannaCry Workplace Tips WIndows Server 2008 Google Maps Computer Accessories Money Public Cloud Apps Administration Miscellaneous Company Culture Risk Management Save Time Tech Support Keyboard Android Security Flexibility Gadgets Files HBO Application Ciminal Audit Hard Drives Device Security HaaS Work/Life Balance MSP Server Computing OneNote Regulation Wireless Technology Communications Sports Computer Fan Disaster Recovery Marketing Patch Management Law Enforcement Data Theft Television Scam iPhone Microsoft Reputation Data Storage Workers Personal Information History Windows 10 Black Market Cybersecurity Outsourced IT Financial IoT Apple Cortana IT Management Backup eWaste Connectivity Windows 10 Business Owner Virtual Reality Value Google Drive Experience Passwords Maintenance Electronic Medical Records Touchscreen NFL Applications PDF Two-factor Authentication Customer Networking Chromecast Touchpad Storage Chrome Mobile Devices Telephone Systems How To Productivity Business Intelligence Productivity Bring Your Own Device Evernote Save Money Data Recovery Phishing Redundancy Data storage Best Practice Cast Compliance Dark Web Twitter Unified Communications Data Loss Office Microsoft Excel