Page 37 - CDM-Cyber-Warnings-March-2014
P. 37
Mobile device education is crucial According to Doten, it’s important to explain the significance of mobile cyber security to each and every employee. If your employees are not tech savvy then this information can help them and your company immensely. It’s particularly important in case they connect to internal network via personal devices they use. There are companies that get into environments of adversaries by hacking into devices of their employees. Hence managing the devices used by employees on internal networks assumes great significance. Encryption is an option that can be used appropriately to get desired security. Log off of computers Not logging off of your network or keeping your computer overnight is like rolling out a red carpet welcome to hackers. Right from information about log-ins to financial data, cyber attackers can easily get access to all kinds of data in such instances. You are better off making it a company policy to log off and ensure that computers are switched off at nights. Frequent backups Even after all the measures you take, it’s not always possible to protect your business from cyber attacks. Hence it’s crucial that you take regular backups of all your important data. To make things easier for yourself, you can set up your system to back up sensitive date daily or at least on a weekly basis. Backup the system manually as well. Financial information, word documents, electronic copies of legal documents, customer account information etc. should all be on backup. Payment card systems and information should be protected You can work with banks and card processors to ensure that you are using trusted tools and anti-fraud services. There might be some security obligations with your bank or card processors; hence it’s important to know your liabilities. Payment systems should be isolated from less secure programs and you can take simple measures like using a different computer to surf and payments. Keep your Wi-Fi networks secured Wi-Fi networks used at work places should be secured, hidden and encrypted. If your Wi-Fi network doesn’t have any password it’s quite a risky proposition because any information you send or receive on it can be accessed by those on the outside. And if you are going to process your information on such a network then you are only inviting trouble. Hence the importance of " # % " $ " # ! !
   32   33   34   35   36   37   38   39   40   41   42