Data Security - Fraudulent Impersonation  
February, 15 2017, ,
Posted by Administrator
Fraudulent Impersonation
Depending on whom you are talking to is can be called different things, i.e. social engineering. No matter what it is called, it is just another way for easy access to information. People wanting information can use a lot of sources of information (social media, websites, etc.) to make them appear to be legitimate sources that should have access to the information requested.
If in doubt about a request for information, money, etc. –
- Try calling the person back at the phone numbers that are provided in their email.
- If the number does reach someone, ask if you can send them an email with a confirmation code to respond to verify that it is a legitimate request
- Call someone else in your organization to verify
Although the above information may seem common sense, these things create problems each day. If nothing else, make others aware. You don’t know what someone doesn’t know until you ask or make them aware.

Data Security - Phishing  
February, 08 2017, ,
Posted by Administrator
Phishing
Everyday there are a lot of emails that cross our paths. During the day many of us will see emails from vendors, customers, and just plain junk mail. Some of the emails that we receive look like they are coming from legitimate senders. We often open emails and click on attachments or respond without really looking at what we are doing. It does not take much more time to slow down and look at the email before moving forward, keep the following in mind when you are receiving emails.
- Have you received emails from this person/vendor before
- Are you expecting an email from the sender
- Does the email look like it is coming from a recognized source, but the content appear off
- When in doubt ask – there is no stupid question when it comes to protecting your companies data

Check back on February 15th for tips on screening people for fraudulent impersonation.

Data Security - Workstation Safety 
February, 01 2017, ,
Posted by Administrator
Workstation Safety
During our busy days at work there are many things that we can do to help keep data secure and ensure that the proper people are seeing the data are those that are intended to see it.
- If you print a document that has sensitive data on it, make sure that you go to the printer and pick it up.
- During meetings, there is often times sensitive information that is discussed and provided in handouts for the attendees. Make sure that all of this information is picked up after the meeting and disposed of properly.
- When leaving your workstation, lock your workstation so that unauthorized access will not be available without entering a password.

Check back next Wednesday, February 8th for tips on keeping your company data safe when so many hackers are phishing for data from your employees.
Data Security - Employee Awareness while Traveling 
January, 25 2017, ,
Posted by Administrator
Traveling
When business associates travel, there is a lot of exposure for their portable devices to be compromised. Whether it is accessing a public Wi-Fi at a hotel or restaurant, misplacing a portable device, or having the portable device stolen (vehicle or hotel room) there are some things to help prevent any unauthorized access.
- Keep your laptop and iPad in your trunk to reduce the temptation of passer byers from seeing these in the car and giving them a reason to break into the vehicle.
- Be aware of what you are accessing on public WiFi networks. If possible, avoid accessing sensitive data when hooked up to these networks. When not working, disconnect from the network.
- Keep your devices on you when possible. Do not leave them unattended and avoid checking them when traveling.
- If you do lose your device, report it immediately so that it can be shut down or locked remotely to avoid access.

Check back on February 1st on ways for your employees to keep your data secure in their workstation.
Data Security - Employee Awareness 
January, 18 2017, ,
Posted by Administrator
If you have turned on the news in the last year you have probably heard about one cyber-attack or another that has occurred in varying degrees of severity. Most of the attacks that are reported involved an outside hacker that has gained access to a company’s computer system and gained access to sensitive data. While this is the most published form of attack that occurs, access can be much easier than an outside hacker getting into the system and it starts with your employee staff.
Over the next 5 weeks we will share some tools to help avoid easy access to company data through employee workspace protection.
Passwords
We have all either said it at one time or heard someone else say it, “There are so many passwords to remember, I have to make all of them the same so I can remember how to log-in to all of the websites, etc.” Others that choose to have different passwords have them written down on a piece of paper that is slid under their keyboard or in an unlocked drawer at their desk. Below are some things to keep in mind when creating a password.
- The longer the password the better. At a minimum make the password at least 8 characters long. If the secure site allows a certain number of characters – make it as long as possible
- Avoid using the same password to access all sites or a small variation of the same password for all sites – Example - Fluffy3 for one site and Fluffy4 for another
- Use capital letters, numbers and symbols when allowed by the site
- If you do write them down, make sure to keep them secured
- Use a phrase to remember your password – “My dog’s name is Fido and was born in 2004” – MdniFawbi#2004

Check back next Wednesday, January 25th for ways to protect your company data while traveling.

<<First <Back | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Next> Last>>