Previous Page  6 / 8 Next Page
Information
Show Menu
Previous Page 6 / 8 Next Page
Page Background

6

W I N T E R 2 0 1 7

Everyone at your business

has a hand in protecting against threats

1. Be sure all computers and mobile devices are running the latest

operating systems (OS).

Malware creators are always adapting, and so are

OS developers. If a vulnerability is identified, developers will fix it in the next

update, so you want to be sure you have it installed.

2. Use antivirus and antispyware software and keep it up to date.

New

threats are discovered daily and keeping your software updated is one of the

easiest ways to protect your business from an attack; simply set your computers

to automatically update for you. Also, activate your firewall and regularly download

the security protection updates (known as patches) that are released by most

major software companies.

3. Educate your employees not to open email attachments from unknown

sources.

Computer viruses are commonly spread through email attachments

so it’s vital to pay attention to the source before opening them. In addition, make

sure your employees don’t click on links within unsolicited email messages.

4. Use long, complex passwords that are unique to each account.

Each

time an employee creates a new password, it should be long (preferably at

least 14 characters) and contain uppercase and lowercase letters, numbers,

and symbols. It’s also important to not use the same password for multiple

accounts and to change passwords regularly.

5. Only download software from reputable sites or stores.

Cybercriminals

tuck malicious code into fake versions of the programs and apps that you want.

The best way to avoid a phony is to stick to official company websites and app stores.

For more information about online security, visit

www.us

-cert.gov/cas/tips.

Cybercriminals are a sneaky bunch and the consequences of their

actions can range from poorly functioning computers to a devastating

data loss. Fight back by having your staff consistently take the following

precautions:

Top Five

Online

Security

Tips

Common

Security Threats

Information systems are among a

company’s most vital assets, yet

they are sometimes left vulnerable

to threats that could damage or

destroy them. In addition to computer

viruses, common threats include:

Denial-of-Service Attacks

A denial-of-service attack (DoS) is

an attempt to make a computer

resource unavailable to its intended

users. It generally involves preventing

an Internet site or service from

functioning efficiently or at all.

Cyber Extortion

Cyber extortion is a new twist on

an old racket—“Give us money or

we’ll shut you down.” Methods vary

but can include a denial-of-service

attack (DoS), theft of confidential

data, defacement of your website, or

an attack that locks up or encrypts

your data.

Unsecured Wireless

Access Points

An unsecured Wireless Access Point

(WAP) or an Access Point that is

using old, outdated technology for

security (such as WEP) provides a

hacker with an easy route into your

network.

Rootkit

A rootkit is a set of software tools

intended to conceal running

processes, files, or system data from

the operating system. Rootkits have

been used increasingly by malware

to help intruders maintain access to

systems while avoiding detection.