How to Protect Your Company from Low-Tech Security Threats

Data theft is a hot topic for businesses, and the discussion is most often focused on the use of modern technology in the workplace. We hear a lot about digital data breaches in the news, but the reality is that physical data breaches and low-tech cyberattacks have the potential to wreak havoc on your business as well. Examples include physical theft, eavesdropping, and cybersnooping.

An alarming statistic is that 26 percent of employees are accessing sensitive data from a device other than a dedicated work computer. When employees are using equipment such as unsecured tablets, smartphones, and flash drives to access confidential information, they’re putting your business at risk of data loss, whether they realize it or not.

Here are some common low-tech security threats and how you can defend against them:

1. Physical access. One of the easiest ways for malicious characters to gain access to sensitive data is by physically walking into your facility. Requiring login access to all workstations throughout your facility will help to prevent physical theft of data. 

2. Environmental factors. Environmental factors such as fire, water, heat, cold, and smoke can damage data. An effective solution to keep your data safe is to use climate-conditioned computer closets in addition to storing data off-site.

3. Digital theft. Digital data can easily be stolen by a hacker or by a criminal using a flash drive. You can protect your digital data from becoming compromised by using IT management tools to restrict USB port activity. Implementing a DLP (Data Leakage Prevention) system will further safeguard your digital data. 

4. Multifunction printers. Multifunction devices create vulnerabilities for unauthorized network access. Additionally, MFPs present the risk for confidential documents to be left on the printer output tray. Require authorized access for MFP devices and […]

By |February 6th, 2018|blog|

Cyberattack Risks for SMBs

Businesses around the world are increasingly falling victim to cyberattacks, costing millions of dollars in lost data and time. Many small and medium sized businesses feel like they’re too small to be targeted, but nearly half of all attacks are aimed at these companies. Taking steps to protect your company is vital to your survival in this ever-changing digital landscape.
Common Types of Cyberattacks

Most cyberattacks fall into one of these categories:

Denial of service (DoS)
Password attack
Malware

In a DoS attack, hackers flood a network with information and requests, causing a “traffic jam” that doesn’t allow legitimate business to get through. If your system becomes too overloaded, it can crash and shut down. It can take hours or days to recover from a denial of service attack, during which your company and clients are at a stand-still.

Password attacks seek to gain access to your system by stealing login data. Sometimes this is done by trying various password combinations until one works, while other times thieves install cameras or software to log key strokes.

Malware attacks are perhaps the best known. This category encompasses viruses, worms, ransomware, and Trojan horse software. Malware can be installed on your system in a variety of ways, but the most common is through email attachments or malicious links in emails or advertisements.
Preventing Attacks

Though cyberattacks can be devastating to your business, simple precautions can dramatically reduce your risk of being victimized. Experts recommend taking these steps:

Install a robust anti-virus program to scan emails, files, and webpages. Be sure you update it regularly.
Install all security patches from your software and operating system manufacturers.
Use and update a firewall.
Tracking software can help detect and stop a DoS attack.
Passwords should be […]

By |December 20th, 2017|blog|