Contact us today!

Network Solutions Unlimited Blog

Maybe You Can’t Fix Stupid, but You Can Fix Your Security

Maybe You Can’t Fix Stupid, but You Can Fix Your Security

It’s easy to dismiss network security if you run a small business that seemingly isn’t a target of malicious attacks. Unfortunately, this dismissive attitude can put your organization at risk, as even a simple security issue could be enough to expose your company to dangerous entities. In fact, we would call it foolish not to secure your organization; and one of the most infamous security failings in history stems from this.

The Equifax Problem
During the months of May and July of 2017, a credit-reporting firm called Equifax fell victim to a data breach that exposed a whopping 148.1 million records containing personally identifiable information. To put this in perspective, the Equifax data breach exposed almost half of the population of the United States of America.

In the wake of this breach, the former Equifax CEO Richard Smith was cross-examined by Congress. Smith’s defense argued that “human and technology errors” were at the heart of the issue. Ultimately, the Chairman of the House Energy and Commerce Committee, Greg Walden, came to the following conclusion: “I don’t think that we can pass a law that fixes stupid.”

How to Fix Your Data Security
While it’s true that there is no guarantee legislation would resolve the issue, you still need to make sure that your organization is doing the best that it can to keep threats from infiltrating its network. You can begin by implementing specific standards on a company-wide level or a case-by-case level.

Here are some ideas that you can start with:

  • Start with compliance: Compliance regulations don’t always have data security in mind. That being said, it’s still an important part of managing your data security, as you could potentially be subject to fines and other troubling regulations.
  • Resolve vulnerabilities: 99 percent of exploits rely on vulnerabilities remaining unresolved in network infrastructures. These exploits also often exploit vulnerabilities that are at least a half a year old. You should make patching these vulnerabilities a priority so that you can best protect your data.
  • Centralize your data security: There needs to be someone at the helm of your data security endeavors. If there isn’t, you make protecting your data much more difficult. This person should be responsible for implementing access control and making sure that nobody can access data that they wouldn’t need for their ordinary workday.

Encouraging Employee Security
Employees hold more sway over your business’ security than they may realize. This makes it difficult to protect important assets, because if you’re overly cautious, you could be compromising your business’ ability to operate as intended. For your benefit, here are a couple of ways that your organization can help employees remain cognizant of their responsibilities.

  • Lazy credential habits: Password problems have persisted in business for a long time. Employees should never reuse passwords or usernames for every account that they have. Each password should be a complex, containing letters, numbers, and symbols to maximize security. You can use a password management system if this gets to be a bit too much for your employees.
  • Oversharing information: You should help your employees work toward limiting just how much information they share about themselves on social media so that passwords are not as easily predicted. Avoid using personal anecdotes whenever possible, and restrict who can see what information to minimize the chances of this happening. You also don’t want information to spread outside of the office, as an invoice or receipt with a customer number could be all a hacker needs to cause trouble.
  • Using the wrong Wi-Fi: Public Wi-Fi is dangerous and therefore, not the ideal way to access secure data. You should work together with your employees to make sure that they have secure access to company documents whenever they need them. A virtual private network is a great way to do this, as it encrypts information sent and retrieved by your devices.

Does your business need to augment security? Network Solutions Unlimited can help. To learn more, reach out to us at 217-428-6449.

Tip of the Week: Canned Responses can Streamline C...
Some of the Value that Cloud Computing Offers


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, August 22 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Project Management Artificial Intelligence Worker Commute Saving Money Fraud Business Intelligence Alexa for Business Save Money Cortana Upgrades Data Loss Professional Services Unsupported Software IT Support Data Privacy Chromecast Customer Excel Internet exploMicrosoft Compliance VoIP Hardware Virtualization Downtime Emails Flexibility Software Mobile Financial Technology Budget Quick Tips Mobile Security Maintenance Root Cause Analysis IT Management Instant Messaging Bring Your Own Device File Sharing Privacy Personal Information Business Computing Firewall Email Health Internet Wireless Technology Cost Management FAQ Shadow IT Computer Forensics Memory Solid State Drive Colocation Humor Microsoft Excel IoT Hosted Solution Scalability IT Services Managed Service Provider Congratulations Administration Lifestyle Public Cloud Going Green Ransomware Apps VPN Streaming Media Outsourced IT Computer Care Network Information Technology Cast Computer Accessories Efficiency Google Assistant Audit Unified Threat Management Video Games Router Internet Exlporer Storage OneNote Students Windows 10 Best Practice Proactive IT budget Telephone Systems Monitors Loyalty Comparison Updates Two-factor Authentication Big Data Patch Management Remote Monitoring Facebook Backup Government Settings Computing Infrastructure Networking Word Phone System Hiring/Firing Automobile Monitor Alert Assessment PDF Social Media File Storage Cache Sports User Error Wireless Charging Commerce Content Filtering Wasting Money Smartphones Two Factor Authentication Google Maps Search Hard Drives Bandwidth Spyware Relocation Twitter Application Users Antivirus Productivity Content Filter Data Security Wireless Internet Keyboard Windows 10s Smart Tech Mobile Devices HIPAA Passwords Managed IT Legal Robot Communication BYOD Identity Theft Internet of Things Cleaning Cloud Computing Gamification Smartphone Marketing Proactive IT Network Security Wireless Techology Books Amazon Webinar Entertainment End of Support Cloud History Data Recovery Regulation Windows Ink Mobility Business Worker Education Physical Security Value Vulnerability Document Management Managed IT Services Training Tech Support Identity Technology CrashOverride Politics HaaS Money Benefits USB Financial Evernote Monitoring Business Continuity HBO Data Breach Save Time Credit Cards Device Security Managed IT Service Sync WIndows Server 2008 Cybersecurity Data storage Remote Computing User Tips Computing Miscellaneous MSP Reputation Operating System Business Owner Samsung Transportation Screen Mirroring Audiobook Gmail Best Practices Office The Internet of Things Server Wi-Fi Virtual Assistant Microsoft Word Files Emergency Work/Life Balance Cybercrime Management Private Cloud Computers IT Support Charger Workers Redundancy Social Engineering Law Enforcement Hard Drive Computer Hybrid Cloud Conferencing hacker Black Market Tip of the Week Augmented Reality Connectivity WPA3 Office 365 NFL Microsoft Laptop Applications Phishing Vendor Management App Automation Licensing BDR Data Theft Scam Hackers Employer-Employee Relationship eWaste Computer Fan Sales Data Management IT solutions IT Solutions Data Experience Tech Term Meetings Travel Workplace Tips Spam Blocking Apple iOS Company Culture SaaS Nanotechnology App store How to Productivity Touchpad WiFi Advertising Adobe Public Computer PowerPoint Windows Windows 10 Gadgets Gifts Dark Web Business Technology Mobile Device Management Printing Virus Retail Recovery Google Information Google Drive Malware Language Mobile Device Bluetooth Spam Managed IT Services Blockchain Touchscreen Data Backup Upgrade Hacking Microsoft Office Electronic Medical Records Safety Tablets Password Communications Rootkit Data Storage Outlook Legislation Collaboration Hard Disk Drive Encryption Analysis Identities Risk Management Browser Television Data Protection Managing Stress Employer Employee Relationship Consultant Battery Specifications How To Chrome Smart Technology Hosted Solutions Thank You Edge Small Business Ciminal Security Disaster Recovery iPhone Google Docs Update Chromebook Innovation Virtual Reality Business Management intranet Holiday Devices Avoiding Downtime Software as a Service Troubleshooting Android Office Tips Websites Unified Communications Shortcut Content WannaCry