WINTER 2017
3
Every computer or other connected device can be vulnerable to
online threats, and the consequences range from simple inconve-
nience to a devastating data loss. Fortifying your company against
these threats is critical in order to prevent valuable information from
falling into the wrong hands or your machines frommalfunctioning.
Make sure you take these essential steps:
1. Use antivirus and antispyware
software and keep it up to date
New threats are discovered daily and keeping your software
updated is one of the easiest ways to protect your business from an
attack; simply set your computers to automatically update for you.
Also, activate your firewall and regularly download the security
protection updates (known as patches) that are released by most
major software companies.
2. Educate your employees not to open
email attachments from unknown sources
Computer viruses are commonly spread through email attach-
ments so it’s vital to pay attention to the source before opening
them. In addition, make sure your employees don’t click on links
within unsolicited email messages or install any software programs
unless they’re from a reputable source.
3. Use strong passwords or passphrases
Passwords should have at least 10 characters that contain a mixture
of uppercase and lowercase letters as well as numbers. An even more
secure option is to use passphrases, which are longer than passwords.
Dan Schilla, Network Manager at RTC, notes, “When possible,
we’ve started using passphrases at RTC. All major operating
systems support them, they’re easier for users to remember,
and they’re much more difficult for cybercriminals to crack.”
4. “Look before you leap”
with sensitive information
Make it a policy to check for signs that a webpage is safe before
you or your employees conduct online transactions. Check for
an “https” at the beginning of a Web address (URL) and a closed
padlock icon beside it. This is an indication that the website has
taken extra security steps to protect your information. Never give
sensitive information in response to an email or instant message
(IM) request.
5. Take special precautions
with laptops and mobile devices
It’s a good idea to have written cyber security practices that address
the use of laptops and mobile devices. For example, when public
Wi-Fi is used, train employees to confirm the exact spelling of the
wireless network they’re connecting to and watch out for clever,
slightly misspelled fakes.
To help with cyber security, RTC offers the fully
automated computer protection of SecureIT Plus.
To learn more, call 888.862.3115.
Cyber
Security
Essentials
You’ve invested so much time and money into building your small business. To protect it, you buy
property insurance, put locks on the doors, and install fire alarms. Have you made cyber security a
similar priority?
Is your business taking these
important precautions?