KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Today is Computer Security Day! Follow this Checklist to Make Sure Your Data is Safe.

Fotolia_54117762_XS

Keeping your computer secure is extremely important. You probably know the frustration of not being able to use your PC if it gets infected with a virus, but it’s easy to forget about risks like data theft. Your data is your business. Your personal information isn’t the only thing at stake; you also owe it to your employees and clients to protect the data you have on them.

November 30th is Computer Security Day. While it’s always important to prioritize security when it comes to your IT, today is a great day to evaluate your current practices and make sure you are doing what needs to be done to protect your computers, network, and company data.

Remember, a chain is only as strong as its weakest link, and your IT is the same. If you have one particular user on your network or one PC that doesn’t get maintained, it puts the entire network at risk. This is why it is important to ensure that your entire organization is made aware of how they too need to consider themselves responsible for the business’ security.

Below, you will find a checklist to help you determine if your business has security-centric habits. Sharing this with your staff and establishing company-wide policies is a step in the right direction towards making your business more security-minded.

Password Etiquette:

    • Use strong passwords that that use a combination of capital and lowercase letters, numbers, and symbols. Or use a passphrase instead with something like; My son drives a 2014 pickup!
    • Passwords are not to be shared. Sharing passwords invalidates their security benefits.
    • Don’t use the same password across multiple accounts. For example, if your Yahoo Mail password is the same as your Paypal password, if hackers get a hold of your Yahoo password, they now have access to your Paypal as well. This happens whenever there is a major breach.

*Your business can set up password policies for certain logins, but it is up to the employee to make sure all of their online accounts are secure.

Access Control:

    • Make use of 2-factor authentication whenever possible. 2FA requires a second credential to be input after the initial password, doubling the relative security of the account in question. This second credential can be a random code delivered via text message or through an app on your phone.
    • Ensure that all mobile devices and workstations are secured by Personal Identification Number or password.

*Your business can set up mobile device policies that require employee devices to have passwords and other security features enabled.

Data Defense:

    • Keep any and all data in the proper network locations, and not on an individual workstation. This is one of the most common mistakes that leads to data loss.
    • Ensure your backups are effective by performing regular tests.
    • Avoid storing company data on portable media like USB drives that could get lost or stolen.
    • Don’t store sensitive company information on personal cloud services like Dropbox or OneDrive unless it is through a centrally managed account. Employees should never use their personal accounts to store company data.

*If your business needs the ability to share and collaborate with files, KT Connections can help you choose and deploy a file management or cloud solution that is centrally managed and secure.

Don’t Invite Hackers In:

    • Don’t open unsolicited attachments in your email, as this is a favorite delivery method for many types of malware, ransomware, and viruses.
    • Avoid using USB thumb or zip drives that were found, as they could carry malware or spyware.

Computer Wellbeing:

    • Keep your Windows operating system updated. You should lean on IT to ensure that these updates don’t inadvertently cause problems by testing them first.
    • While online, check all URLs for the presence of “https” at the beginning, especially when shopping online.
    • Avoid connecting to unsecure Wi-Fi networks while out of the office. This can open your data up to eavesdroppers and introduce more threats to your network.

Feel free to copy this checklist and distribute it amongst your users. Looking to evaluate your company’s IT security? Call us at 605-341-3873 to schedule a security audit of your entire network and to help you establish the best practices and policies to protect your data and avoid costly issues.

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices hackers Technology Email Privacy Business Computing Cloud Internet malware Network Security Google software Ransomware Business Efficiency User Tips Data Backup Microsoft IT Support Computer cybersecurity IT Support VoIP Facebook Network Hardware Smartphone Small Business Windows Hosted Solutions Mobile Device Management Gmail Managed IT Services Money Android Productivity Cloud Computing Artificial Intelligence Phishing IT Management communications Business Continuity Data Management Mobile Devices Operating System Microsoft Office Windows 10 Outlook Alert IT Services Antivirus Data storage Bandwidth Update Upgrade Windows 10 security cameras Business Management Unified Communications Disaster Recovery Social Media Outsourced IT Internet of Things Passwords End of Support data breach Communication Apple Smartphones Nextiva BDR Encryption Scam Document Management SaaS Saving Money Lunch and Learn Information Technology Data Recovery Start Menu Automation Networking Hard Drive Cost Management Big Data News Data Backup security solutions The Internet of Things Events Access Control Apps Google Wallet Word Firewall Patch Management BYOD Event Marketing Google Docs Gadgets Local Buzz Legal Productivity South Dakota WiFi Project Management Analytics YouTube Best Practice Drones Collaboration History Politics IoT Spam Server App vulnerability Remote Monitoring Office 365 Innovation Customer Service Managed IT Services Browser Law Enforcement Search IBM Robot Google Maps Save Money Hardware as a Service business owner Retail Google Calendar Kaseya Connect DDoS attacks Information Security Cryptocurrency Computer Care Memory Event Sarbanes-Oxley Act Knowledge Solid State Drive HaaS communication solutions Business Growth Business Communications Conference Business Comunications Email Security vulnerabilities DDoS Running Cable Virtualization security precautions Press Release Cleaning Chamber of Commerce identity theft Mixer Network Congestion End User Testing VPN Tech Terms Uninterrupted Power Supply Vendor Mangement Hacking Deep Learning Microsoft Office 365 Comparison Touchscreen Dell ’s Sonicwall Global Management System Cabling Digital media experience Vendors Data Protection Business Mangement Office Password Social Engineering Penetration Testing Social Microsoft Office 365 features Specifications How To Websites Access information Community Involvement Vendor Management Data Security Corporate Profile face Education Phishing Scams Experience Television Programming Software as a Service Redundancy Worker Spyware Rebrand Flash Download Monitors Audit Cloud Backup Google Drive enterprise productivity software surveillance cameras File Sharing IT Consultation Sports Hosted Solution Mouse Rapid City Content Filtering Virus Web Servers Wireless Technology Applications Settings healthcare Displays Maintenance Virtual Machines Telephony Local Technology Trend Micro LiFi Workers password manager LastPass AtomBombing IT Assessment Physical Security SharePoint IoT Devices Managed IT Law IT Distributed Denial of Service Managed Service Provider Internet 101 Cache Society Tips and Tricks tool Streaming Media Workplace Tips Proactive IT Fortinet Risk Creep VoIP Sales Tax Fast food Google Play Store Visible Light Communication Samsung user confidence IT Strategy Bluetooth appointment Quick Tips IT Security Lawyers Emergency Windows 8 Internet Connected Devices Windows XP Office Tips Music Business Security IT for Oil Companies Website Tablets Administration Safety Compliance Freedom of Information Laptop IT Solutions Webcam Business Technology Communications Tech Support Writing Printing Risk Management botnet attack Time Management Mobility Government camera Advertising LastPass Microsoft Bookings Fake News Tablet Attorneys Disaster Budget Phone System Printer communication device Remote Computing Virtual Desktop Black Market Downloads Kaseya botnet Unified Threat Management Virtual Reality macbook booking process Microsoft Excel SOX Hack Managed Services Machine Learning Supercomputer Hiring/Firing Health Bring Your Own Device Banking Relocation Administrator IT Consultant Hacker network security professionals 3D Printing base infrastructure Training Hacks Playbook Automobile Holiday security solution Unified Threat Management Employer Employee Relationship Work/Life Balance Notifications breach methods Business Metrics Digital Payment end-of-support date holiday season Public Cloud Wi-Fi Rental Service Taxes collaboration capabilities Chromebook UTM Flexibility Users holidays Paperless Office Documents Cortana Threat management Reliable Computing scammers Text Messaging PDF Twitter Scalability Computing scams CCTV G Suite Computer Malfunction Travel Phone Systen Language Processors Web Server Employer-Employee Relationship IT service Messenger Sync Private Cloud Meetings Miscellaneous Microchip Marketing Ordinary Computers Books CrashOverride Emails In Internet of Things Motion Sickness quantum computers Tracking Telephone Systems Reading