If your IT Provider gets breached, it opens the door for cybercriminals to access your private data. Read how to make sure your IT Provider isn’t the weakest link in your data security.
Tag Archive for: Data Security
Multi-factor authentication is the number one security control Northeast Ohio businesses can implement today to help prevent a data breach.
PCR Business Systems is thrilled to welcome Andrew Unger to our team as our newest Akron IT support specialist and onsite technician.
Unfortunately, due to the Coronavirus many employees have been forced to work from home, or may be working from home in the near future. If you find yourself in this situation it’s important to remember to follow the best IT security practices when working from home to not put your company at risk of an online virus or cyberattack.
Working remotely can be challenging because you likely don’t have the same security safeguards in place at home as you do in the office. In addition, most people have multiple devices connected to their home Wifi, including personal computers, smartphones, game consoles, etc. These can all offer hackers a gateway into your home Wifi which can then give them a backdoor into the corporate device you are working from. It’s up to you to implement your own layers of security controls at home to prevent your company’s data from being breached.
Cyber criminals love to prey on companies when they are most vulnerable, and one of the weak spots they look for is employees who are not following the best IT security practices for working remotely.
Below is a list of things you can do to prevent cyberattacks while working remotely. You should follow these guidelines whenever you are logged into a corporate laptop or phone, even if it’s just to check a few emails.
IT Security Checklist for Remote Employees
Only Use Secure Wifi
- Avoid using Public WiFi
- Use a VPN (Virtual Private Network)
- Change the default Wifi router passwords to something more secure
- Update router firmware
Protect Your Workspace
- Don’t use your personal computer for work
- Don’t let anyone eavesdrop on what you are working on
- Encrypt sensitive data in emails
- Don’t use the same passwords on work devices as you do personal devices
- Update software for all devices that are connected to your home network (this includes personal computers, television services, game consoles, thermostats, etc.)
Secure Your Devices
- Update firmware
- Create strong passwords using multi-factor authentication
- Review and follow corporate policies and procedures
- Don’t leave your work devices unaccompanied in a vehicle
- Keep your home or apartment securely locked
Use Common Sense
- Don’t share your work devices with family or friends
- Don’t post business itineraries or corporate information online. This includes posting photos that may show addresses, client information, or any other personal or business information in the background
- Don’t let your guard down. It’s easy to feel comfortable at home but practice the same IT security best practices at home as you would at work
Report Any Security Issues Immediately
- Don’t wait until it’s too late. If you fear your work computer has been breached contact an IT professional within your company immediately
Fill out the form below or contact PCR Business Systems if you have any questions about setting up a secure workspace for your remote employees.
We are happy to welcome Lucas Wright to the PCR Business Systems Team. Lucas brings with him IT experience as well as enthusiasm and we’re extremely excited to have him as part of our team.
Here are a few things about Lucas to help you get to know him better:
- Lucas recently got married!
- He and his wife adopted a pup a few years ago. It was around Halloween and they named him “Zero” after the ghost dog from Nightmare Before Christmas which was playing at the time
- He grew up in Tallmadge where he went to high school and was a member of the robotics club and student senate
- He obtained a Bachelor of Arts in Anthropology from the University of Akron before shifting gears and going into IT
- He enjoys playing PC and tabletop games
- He recently completed Google’s IT Support Professional Program and has plans in the works to obtain several more IT certifications
Questions for Lucas:
Q: What do you usually have for breakfast?
A: Big bowl of oats
Q: What is your middle name?
Q: Favorite sport to watch?
A: Overwatch League (esport) and the Browns
Q: Goal you have for yourself?
A: My recent goal has been achieved in getting hired here at PCR. Next I want to accomplish getting my A + certifications, and then start working on obtaining other CompTIA certifcations (Network + & Security+) to really expand my knowledge and skillset.
A: My pup named Zero. Two cats Lily and Calvin
Q: What is your hobby?
A: PC and tabletop gaming
Q: What is your favorite restaurant?
A: Saffron Patch. It’s an Indian restaurant in the Valley.
Q: What is your favorite drink?
A: French press coffee or really any IPA
Q: What’s your favorite travel destination? (been there or want to go)
A: Cruises anywhere.
Q: What characteristics do you admire (in self or others)?
A: Definitely a good sense of humor! And a genuine sincerity in the way they talk or listen to you.
In businesses since 2004, PCR is the trusted IT provider for Akron area businesses. Learn more at pcrbusiness.com.
Think of your internet and sensitive data like you would a car. We take several preventative measures to keep our vehicles from being the target of thieves. We lock our doors, hide valuables from plain sight, install car alarms and anti-theft devices like the Club, and avoid parking in unsafe and dimly lit areas.
So why don’t we always take similar steps to protect our computers and smart phones from people looking to steal our valuable information or money from our online accounts?
Just like car thieves, most hackers look for easy targets. They’ll prey on victims with weak passwords or who use unsecured WiFi to access important financial accounts or to make online purchases. Fortunately, just like with keeping our cars from getting stolen or broken into, a little cyber defense can go a long way in keeping you from getting hacked.
Below are 5 simple things you can do RIGHT NOW to minimize your chances of being hacked.
1). Make sure your security software is up-to-date. Don’t ignore those notifications that pop-up on your screen telling you that your operating system requires an update. That update may contain critical security patches that must be installed in order to keep your system protected from hackers.
Email programs, apps and web browsers should all be updated whenever a software update is available. In addition, as we wrote in the article “End of the Road for Windows 7 and Windows Server 2008,” make sure you are using an operating system (OS) that is not obsolete. Using an OS or any software that is no longer supported can leave you extremely vulnerable to a cyber-attack.
2). Create strong passwords, change them regularly, and don’t use the same password for everything. This seems pretty simple, and it is! In the unfortunate event that a hacker gains access to one of your passwords, for example your Facebook login; you can mitigate the damage by ensuring that password is ONLY used for Facebook. If you use the same password for Facebook as you do for your online banking, email, etc. you could be in real trouble as hackers will have access to all of those accounts.
Fortunately, you can prevent hackers from gaining access to any of your accounts by creating strong passwords with a variety of numbers, capital letters, and unique characters, and changing them regularly. Keep a log of your passwords locked in a safe place in your desk or your home.
3). Use Multi-Factor Authentication on all devices. In addition to password protection, you can also thwart off hackers by using multi-factor authentication for all connected devices. Multi-factor authentication simply means that you must present multiple credentials (in addition to just a single password) to gain access to your device or account. Using Multi-factor authentication will help protect your sensitive data against the leading cause of data security breaches– stolen credentials.
4). Install proper antivirus software. If you already have up-to-date security software installed, good for you! You’re one step ahead. If you don’t, make sure you install a firewall today and stay current with updates. Do your research before installing any program or software, and feel free to give us a call at 330.572.7575 or email directly at email@example.com and we can recommend the best antivirus and antimalware software on the market today.
5). Limit the use of public WiFi and unsecured devices. Do your best to only browse the internet from a secure network. While we understand this may be difficult while traveling, especially if you need to book a last minute hotel or pay a bill online, try to find a network that is safe and password protected. Never use open Wifi for accessing email or important accounts. Just as you wouldn’t leave your purse or laptop on the front seat of your car for a would-be thief to see, you should never display sensitive data on an unsecured network for hackers to get their hands on. Troubleshooting internet connection problems>>
Staying ahead of hackers can be a challenging task. However, implementing these five things today will at the very least make it more difficult for hackers to gain access into your data–limiting the chances they’ll go after you in the first place.
In Business since, 2004, PCR Business Systems is the leading IT Service Provider in Akron, OH and is SOC 2 Audited and Certified. Schedule a free review of your IT today!