Previous Page  3 / 8 Next Page
Information
Show Menu
Previous Page 3 / 8 Next Page
Page Background

WINTER 2017

3

Every computer or other connected device can be vulnerable to

online threats, and the consequences range from simple inconve-

nience to a devastating data loss. Fortifying your company against

these threats is critical in order to prevent valuable information from

falling into the wrong hands or your machines frommalfunctioning.

Make sure you take these essential steps:

1. Use antivirus and antispyware

software and keep it up to date

New threats are discovered daily and keeping your software

updated is one of the easiest ways to protect your business from an

attack; simply set your computers to automatically update for you.

Also, activate your firewall and regularly download the security

protection updates (known as patches) that are released by most

major software companies.

2. Educate your employees not to open

email attachments from unknown sources

Computer viruses are commonly spread through email attach-

ments so it’s vital to pay attention to the source before opening

them. In addition, make sure your employees don’t click on links

within unsolicited email messages or install any software programs

unless they’re from a reputable source.

3. Use strong passwords or passphrases

Passwords should have at least 10 characters that contain a mixture

of uppercase and lowercase letters as well as numbers. An even more

secure option is to use passphrases, which are longer than passwords.

Dan Schilla, Network Manager at RTC, notes, “When possible,

we’ve started using passphrases at RTC. All major operating

systems support them, they’re easier for users to remember,

and they’re much more difficult for cybercriminals to crack.”

4. “Look before you leap”

with sensitive information

Make it a policy to check for signs that a webpage is safe before

you or your employees conduct online transactions. Check for

an “https” at the beginning of a Web address (URL) and a closed

padlock icon beside it. This is an indication that the website has

taken extra security steps to protect your information. Never give

sensitive information in response to an email or instant message

(IM) request.

5. Take special precautions

with laptops and mobile devices

It’s a good idea to have written cyber security practices that address

the use of laptops and mobile devices. For example, when public

Wi-Fi is used, train employees to confirm the exact spelling of the

wireless network they’re connecting to and watch out for clever,

slightly misspelled fakes.

To help with cyber security, RTC offers the fully

automated computer protection of SecureIT Plus.

To learn more, call 888.862.3115.

Cyber

Security

Essentials

You’ve invested so much time and money into building your small business. To protect it, you buy

property insurance, put locks on the doors, and install fire alarms. Have you made cyber security a

similar priority?

Is your business taking these

important precautions?