Cybercrime is a major issue for everyone and especially for businesses. In fact, if you don’t have a solid handle on the actions you take, your IT may be more exposed than you think. This month we thought we would go through a few really simple actions you can take to enhance your security posture.
Update Your Software
Your business runs on software; and most businesses have a lot of it. That is a lot of potential vulnerabilities if all of that software isn’t updated with the latest patches and threat definitions. We understand that since there is so much software to manage and maintain, that some lightly-used programs or mobile apps can be overlooked. This isn’t good, however. You absolutely need to ensure that EVERY SINGLE APPLICATION your business uses is updated regularly.
Using Insecure and Repetitive Passwords
So many people (and businesses) are guilty of this security faux pas. Insecure passwords are some of the most exploited security components. Good password practices include:
- Don’t use the same password twice: You should never use the same password for multiple accounts. If one password is compromised, and you have used the same password for multiple sites, then that means all of those accounts are also potentially compromised. For the best results use different, complex passwords for each of your accounts.
- Make passwords easy to remember but hard to guess: It is much easier than you might think. One way you can make a password easy to remember but hard to guess is to create passphrases for each account. Basically pick three words that don’t have any natural relationship with each other and then spruce it up by using upper and lower case letters, numbers, and symbols.
- Prioritize length rather than complexity: While complexity is still extremely important for passwords, length is the biggest deciding factor when determining how infiltrators will be able to crack them. The way it works is the more characters are involved, the harder it is for a hacker to find the right combination. You should, of course, still use letters, numbers, and symbols when you can, though.
Multi-factor authentication should be deployed everywhere it is offered. That extra layer of security is a great tool when looking to combat the myriad of threats trying to gain access to your accounts, and ultimately, your business’ network.
Using Questionable Connections
When working remotely or through mobile devices while out of the office, people often connect to suspect Wi-Fi signals that can be completely compromised from the outset and can lead to transmitted data to be intercepted and for networks to be corrupted. One tool that can help is called a virtual private network (VPN). This tool gives an encrypted connection that allows data to be sent and received over these suspect networks.
Protecting your digital resources and information systems is becoming more important than ever before. If you would like to talk to one of our IT professionals about getting the security tools you need to keep your business safe, give us a call at (317) 759-3972 today.