How is BYOD a security risk?

Bring your own device (BYOD) strategy is when an employee uses their personal mobile device to work with your company from anywhere. This strategy can bring about many advantages to your business such as increased efficiency and convenience. However, this can also bring a number of security risks for your IT infrastructure and data.

IT Security Tip #11: You’ve been HACKED! What’s the first thing you should do?

Quick Tip:  Call for help immediately.

Why:  No matter how diligent you are about security, there’s always a chance you can get hacked. That’s why you need to put a plan in place NOW to protect yourself and your CLIENTS so damage is minimized. But what should you do if you find out you’ve been hacked?

First, contact your IT department (us) IMMEDIATELY. The faster we can address the attack—and determine the extent of the data, applications and machines compromised—the better your chances are of preventing much bigger problems.

IT Security Tip #10: Set up bank alerts – NOW!

Quick Tip:  Set up withdrawal alerts on your bank accounts--both personal and work.

Why:  Many banks will send you an email alert whenever money is withdrawn from your account via check, debit card or transfer. Setting up those alerts will allow you to spot and report fraudulent activity BEFORE the money has already been siphoned into a cybercriminal’s hands.

Business Identity Theft

Identity theft is no longer just a consumer crime. Thieves have learned that businesses also have identities that can be stolen and are, in fact, more lucrative targets. In terms of potential damages, business identity theft could be considered consumer identity theft's more evil twin sister, similar to Jeannie’s evil twin sister, also named Jeannie, in the popular 1965 TV sitcom, I Dream of Jeannie.

IT Security Tip #8: Don’t just close your browser!

Quick Tip: Logoff and then close your web browser.

Why: When online accessing a banking site or any other application containing sensitive data, make sure you logoff of the site and THEN close your browser. If you simply close your browser, some of the session information that a hacker can use to gain entry is still running in the background.