Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Maybe You Can’t Fix Stupid, but You Can Fix Your Security

Maybe You Can’t Fix Stupid, but You Can Fix Your Security

It’s easy to dismiss network security if you run a small business that seemingly isn’t a target of malicious attacks. Unfortunately, this dismissive attitude can put your organization at risk, as even a simple security issue could be enough to expose your company to dangerous entities. In fact, we would call it foolish not to secure your organization; and one of the most infamous security failings in history stems from this.

The Equifax Problem
During the months of May and July of 2017, a credit-reporting firm called Equifax fell victim to a data breach that exposed a whopping 148.1 million records containing personally identifiable information. To put this in perspective, the Equifax data breach exposed almost half of the population of the United States of America.

In the wake of this breach, the former Equifax CEO Richard Smith was cross-examined by Congress. Smith’s defense argued that “human and technology errors” were at the heart of the issue. Ultimately, the Chairman of the House Energy and Commerce Committee, Greg Walden, came to the following conclusion: “I don’t think that we can pass a law that fixes stupid.”

How to Fix Your Data Security
While it’s true that there is no guarantee legislation would resolve the issue, you still need to make sure that your organization is doing the best that it can to keep threats from infiltrating its network. You can begin by implementing specific standards on a company-wide level or a case-by-case level.

Here are some ideas that you can start with:

  • Start with compliance: Compliance regulations don’t always have data security in mind. That being said, it’s still an important part of managing your data security, as you could potentially be subject to fines and other troubling regulations.
  • Resolve vulnerabilities: 99 percent of exploits rely on vulnerabilities remaining unresolved in network infrastructures. These exploits also often exploit vulnerabilities that are at least a half a year old. You should make patching these vulnerabilities a priority so that you can best protect your data.
  • Centralize your data security: There needs to be someone at the helm of your data security endeavors. If there isn’t, you make protecting your data much more difficult. This person should be responsible for implementing access control and making sure that nobody can access data that they wouldn’t need for their ordinary workday.

Encouraging Employee Security
Employees hold more sway over your business’ security than they may realize. This makes it difficult to protect important assets, because if you’re overly cautious, you could be compromising your business’ ability to operate as intended. For your benefit, here are a couple of ways that your organization can help employees remain cognizant of their responsibilities.

  • Lazy credential habits: Password problems have persisted in business for a long time. Employees should never reuse passwords or usernames for every account that they have. Each password should be a complex, containing letters, numbers, and symbols to maximize security. You can use a password management system if this gets to be a bit too much for your employees.
  • Oversharing information: You should help your employees work toward limiting just how much information they share about themselves on social media so that passwords are not as easily predicted. Avoid using personal anecdotes whenever possible, and restrict who can see what information to minimize the chances of this happening. You also don’t want information to spread outside of the office, as an invoice or receipt with a customer number could be all a hacker needs to cause trouble.
  • Using the wrong Wi-Fi: Public Wi-Fi is dangerous and therefore, not the ideal way to access secure data. You should work together with your employees to make sure that they have secure access to company documents whenever they need them. A virtual private network is a great way to do this, as it encrypts information sent and retrieved by your devices.

Does your business need to augment security? Network Solutions Unlimited can help. To learn more, reach out to us at 217-428-6449.

Tip of the Week: Canned Responses can Streamline C...
Some of the Value that Cloud Computing Offers
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, October 20 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Evernote Software as a Service Value Video Games Audiobook Hardware Office Computers Smartphone Big Data Scalability Chrome Robot Unified Threat Management Files Apple Wireless Internet Google Assistant Automation Financial Managed IT Service Root Cause Analysis Best Practice Wi-Fi FAQ Internet Google Docs Passwords Budget Language Law Enforcement Shortcut Microsoft Word Managed IT Bluetooth Save Time Money Cleaning Testing Data Privacy Data OneNote Hard Disk Drive Computing Business Intelligence Employee-Employer Relationship Sync Regulation USB IT Solutions Fraud Downtime Avoiding Downtime Google Maps Office 365 Streaming Media Wireless Technology Computer Fan eWaste Office Tips Device Security HBO Licensing The Internet of Things Cortana Mobile Automobile Cybercrime Troubleshooting Content Filtering Printing Flexibility Emergency Vulnerability Lifestyle Computer Accessories Accessory Ransomware Data Backup Smart Tech Data Management Hard Drive Vendor Management Apps Malware IT Support Tech Term Managing Stress Tablets Comparison Data Protection Identity Touchpad Rootkit Humor Microsoft Excel Networking Information Wireless IT Management Relocation Data storage Websites Hackers Google Drive Wireless Charging Instant Messaging Microsoft Memory Tech Support Specifications Cost Management Students Network Security Update Save Money Consultant Augmented Reality Peripheral Work/Life Balance Mobile Device Management Social Media Congratulations Hacking Outlook Computing Infrastructure Maintenance History Legislation Techology Battery intranet Thank You Printers Risk Management BYOD Workplace Tips Samsung Laptop HIPAA Monitors Disaster Recovery Amazon Spam Hard Drives Emails Microsoft Office Updates Business Owner Virtualization Travel Project Management Identity Theft Nanotechnology WIndows Server 2008 VoIP Entertainment Facebook File Sharing Camera Legal Application Patch Management Operating System Small Business Devices Data Security Data Breach Firewall Proactive Employer-Employee Relationship Windows 7 Windows 10 Company Culture Server Administration Collaboration Smart Technology Advertising Hiring/Firing Technology How To Mobile Devices Storage Compliance Wasting Money Business Innovation Computer Phishing Experience Retail Social Engineering Public Cloud Outsourced IT Adobe Gifts Communications Screen Mirroring Solid State Drive Bring Your Own Device Mobile Security Email Backup Telephone Public Computer Projects MSP Wasting Time Hyperlink VPN Bandwidth Business Continuity Virtual Assistant App Financial Technology Virus Credit Cards Training Upgrade Content Filter Software Physical Security Blockchain End of Support Customer IT Services IT solutions Workers Television Data Theft Unsupported Software Data Loss IT budget How to Cloud Spam Blocking Co-Managed Services Assessment Tip of the Week Employer Employee Relationship App store IT Support BDR Computer Care Managed Service Transportation Charger Spyware Hosted Solutions Computer Forensics Gadgets Two Factor Authentication Remote Computing Windows 10 Connectivity Education Sales Marketing Phone System Private Cloud Business Management Browser Edge Identities Holiday Windows 10s Antivirus Productivity WPA3 Monitor Data Storage Meetings Redundancy CrashOverride iOS Benefits Hosted Solution IoT Government Excel Remote Monitoring Touchscreen WannaCry Ciminal Alert Managed Service Provider Gamification Business Computing Password Audit Webinar User Error Internet Exlporer Black Market Monitoring Content Personal Information Safety Virtual Reality Google Worker Commute PDF Router WiFi Reputation Information Technology Dark Web Shadow IT Conferencing Search Management Display Loyalty Telephone Systems Document Management Miscellaneous PowerPoint Recovery Best Practices Artificial Intelligence Mobility Android Users Colocation Professional Services Electronic Medical Records iPhone Data Recovery Health Hybrid Cloud Upgrades Quick Tips Encryption Politics Productivity Going Green Network Books Worker Privacy Security Vendor Chromecast Scam Unified Communications Windows Ink Cloud Computing User Tips Internet exploMicrosoft NFL Internet of Things Windows Word Alexa for Business Cybersecurity HaaS Managed IT Services Efficiency Sports Communication hacker SaaS Chromebook Analysis Two-factor Authentication Managed IT Services Keyboard Saving Money Smartphones Commerce Applications Mobile Device Gmail Settings Proactive IT Cache File Storage Cast Twitter Business Technology