Insight From Innovation
In this issue:
- Leaders with Vision Show the Way
- The Next Best Thing to Being There
- Get Tunnel Vision with a Virtual Private Network (VPN)
- Password Headaches
- The Bigger the Better
Quick Tips:
(1) Bookmark websites accessed frequently to avoid scams from copycat websites.
(2) Implement multi-factor authentication (MFA) now.
Why: You do not want to share your credentials with anyone! Hackers put up websites that look almost exactly like real websites to fool you into getting that information.
Quick Tip: Make your email password different than all others.
Why: You know you’re guilty of it: using the same password for everything. Believe me, I understand how annoying it is to try and remember all those passwords. If you’re using the same password for sites that don’t share sensitive information, like a login to a news feed you like to read, then it’s generally okay.
Quick Tip: Check before you use personal devices to access company data.
You’re a hard worker who likes to check email and get a few things done after hours--all good! But here’s something you might not know: you should never access company data, file servers or applications through personal devices and home PCs that are not properly monitored and maintained.
We’ve all done it…written an email and clicked send before realizing that we forgot to add an attachment, spelled something wrong or sent it to the wrong person.
Most email interfaces are designed to have you start each email with the recipient's address, then add the subject, then the body, and then the attachment.
Your business’ IT environment is a lot like the body’s skeletal system. It’s the conductor that orchestrates the flow of your day-to-day operations, allowing you to provide valuable services to your clientele. When your IT skeleton, or foundation, is strong and healthy, it supports all of the processes you rely on and you don’t even realize it’s there.
Quick Tip: Confirm it’s a legitimate Wi-Fi network before you connect.
Why: It’s not uncommon for hackers to set up fake clones of public Wi-Fi access points in an attempt to get you to connect to their Wi-Fi instead of the legitimate, safe public one being made available to you.