Call (716) 373-4467
12Jul

Paint a target on your back..

 
If you’re only using cell phones for business, you may as well paint a target on your back.
 
Since 2018, cyber-attacks on employees devices have increased year after year. It makes sense, they’re the perfect target for an attack.
 
People assume that their phones, and other devices, are untouchable; but the truth is, there’s malware (malicious software) out there waiting to strike because any device can be a goldmine of valuable data.
 
Most people use their devices all day every day and not just for personal use. They’ll access their work emails, documents and client data and their devices hold their passwords, their location history, and financial information.
 
Unfortunately, most businesses don’t take security seriously.
 
Here are three things you should do:
  1. If you don’t already, create policies for your business to ensure that lost or stolen devices are reported immediately; that updates are installed as soon as they become available; and that two-factor authentication, passcodes, or biometric logins are used.
  2. Give your entire team formal education in cyber security and the red flags to be aware of. Discourage your team from accessing public Wi-Fi and test them regularly on their security awareness.
  3. Make sure that data on employee devices is encrypted, and that you have a lockout policy in place if a login is entered incorrectly after a few attempts. This will block brute force attacks, where lots of possible passwords are repeatedly entered until the right one is found.
Mobile devices, like cell phones and laptops, are becoming a real area of data security weakness for businesses, so it’s important that you increase your protection, before it’s too late.
 
We can help to keep your business devices protected against security threats. Give us a call at 716-373-4467 or email info@databranch.com to learn how!
comments powered by Disqus
2FA AI APC backup business continuity BYOD client of the month cloud computing computer services computer support computer upgrade Computer Upgrades Control Chief covid-19 CryptoLocker CryptoWall Cyber Attacks cyber criminal cyberattack cybercrime cybersecurity Cybersecurity Training Dark Web Monitoring Dark web scan data protection Data-Loss Prevention Databranch Databranch Comprehensive Care databranch cto databranch employees Discounts doug wilson dura-bilt email migration email security End of Support Exchange Online Facebook field technician Hardware Refresh heat-induced server crash holiday computer tips holiday internet tips How Long Do I have to Upgrade my Windows 7 Computers? ID Agent Information Technology Internet Security IT Outsourcing IT Services J.P. Morgan malware managed service managed services Microsoft Microsoft End of Support Microsoft Patching Microsoft Support Microsoft Telephone Scam mike wilson mobile device security Multi-Factor Authentication Network Infrastructure Office 2013 Office 365 old UPS password management password security Penn-Troy Manufacturing Phishing Attacks Power Failure proper server environment Ransomware remote access repeatbusinesssystems SBS2011 security security vulnerabilty Server 2008 Server 2008R2 Server Upgrade server virtualization Small Business Small Business Server 2011 smb SMS intercept Social Media stolen credentials Symantec Symantec Backup Exec temperature Tips Two-Factor Authentication Upgrading to Windows 10 UPS virus Western New York Windows 10 Windows 7 Windows Server 2003 Windows Server 2012 winrar