The California Consumer Privacy Act went into effect on January 1, 2020 and affects every company that does business with California residents. I expect we will see more data privacy laws coming online soon. Violation of these laws typically come with heavy consequences and it’s safe to assume that all businesses will eventually be impacted by data privacy laws. Here are some great steps to help you prepare.
In my malware terminology breakdown below, I explain that malware is a general term for all programs written to harm your data and/or to spy on your computer activity. It’s generally thought that these extortionists might target larger companies for bigger payouts, but 50 to 70 percent of ransomware attacks are targeted at small and medium sized businesses.
Changes in how we do business because of the pandemic has left small businesses even more vulnerable. A ransomware attack on a small business may have less ramifications than an attack on a hospital or a public utility, but the consequences for your business directly can be more severe. 43% of all data breaches involve small and medium-sized businesses. Repeat ransomware threats are becoming more likely for companies that recover from these incidents. Here are some things you need to know about malware.
As we continue to transition how we do business, it’s important to understand the IT security implications of remote and hybrid workforces and their access to shared passwords. Research shows that roughly 46% of SMBs use a password manager. 51 percent of businesses rank it as their top priority. Only 15% of organizations ranked single sign-on (SSO) as a major priority, while multi-factor authentication (MFA) and Principle of Least Privilege were both at the top of the list for 9% of companies.
When choosing a password manager, it’s important to make sure it is the right fit - beyond cost. A good password manager should scale as the business grows, includes encryption, and most importantly, be easy to use. Even if your team is small, those features grow increasingly important as your team grows.
If you are not using a password manager, here are a few reasons you need to add it to your next budget:
As technology becomes more integrated with our work and social lives, we are more likely to encounter tech terminology in our daily conversations. In celebration of Cyber Security Awareness Month, here are my picks for the top 10 IT security terms you should be familiar with:
A firewall is a piece of software or hardware that can be set up to restrict data from specific sites or programs while allowing relevant and necessary data to flow through. Firewalls have been the first line of defense in network security for over 25 years. A firewall can be hardware, software, or both.
MFA might seem complicated at first but it’s quite simple. Its increased use has organizations focusing more than ever on making sure the experience is smooth for users. You probably already use it without knowing. For example, you’ve used MFA if you’ve:
MFA is a security enhancement that allows you to present two pieces of proof - your credentials - when logging into your account. Your login information falls into one of three categories: information you know (like your password or PIN), the information you own (like a smart card), or information about who you are (like your fingerprints). Your login information should come from two different categories for improved security. Therefore, entering two different passwords will not be considered multifactorial.
Terms like virus, spyware, trojan, worm, and ransomware are often confused, although they have distinct meanings. All of them, in most cases, have a malicious aim - to destroy data, spy on computer activity, and so on. Malware is a catch-all phrase for all these programs; it simply refers to any software built with malevolent intent. Viruses are the most common type of malware, however, there is more to malware than viruses. Here is a breakdown:
Malware is any software program deliberately designed to damage a pc, server, or network.
A computer virus is a dangerous piece of software that spreads from one device to another. These self-copying threats, which are a subset of malware, are usually designed to harm a device or steal data.
Spyware is harmful software that collects information about a person or organization and sends it to a third party to harm the user.
A Trojan horse is a form of malware that masquerades as genuine software. Trojans can be used by cybercriminals to spy on you, steal your personal data, and get backdoor access to your system once they've been launched.
A computer worm is a sort of virus that duplicates itself and transmits it from one machine to another. A worm may replicate itself without the need for human intervention, and it does not require attachment to a software application to cause harm.
Cloud backup is a service that backs up and stores data and applications. Businesses use cloud backup to keep files and data accessible in the case of a system or power outage, hardware failure or damage, or a disaster (natural or otherwise). Cloud backup works by duplicating and storing your server's files on another server in a different physical location. This is a great security layer to protect your data in the event of a network security incident.
SSO allows users to log into numerous applications using a single set of credentials. That means you just need to enter your login and password once to access a business' system (your network or a business site you're using online), and you won't have to do so again to access each application they have.
The Principle of Least Privilege states that users, systems, and processes should only have access to resources (networks, systems, and files) that are absolutely necessary to accomplish their assigned duties.
Data privacy refers to the procedures you have in place to ensure that the information provided by your clients or customers is only used for the reason for which it was given. Individuals' right to regulate how their personal information is gathered and utilized is known as information privacy.
A managed service provider (MSP) is a third-party company that manages your information technology (IT) infrastructure and workstation systems. Businesses often partner with MSPs to perform a defined set of day-to-day management services, including helpdesk and maintenance. These services may also include security and monitoring.
Typically, RDC requires the remote computer to enable the Remote Desktop Services and to be powered on. The connection is established when a local computer requests a connection to a remote computer using RDC-enabled software. On authentication, the local computer has full or restricted access to the remote computer. Besides desktop computers, servers, and laptops, RDC also supports connecting to virtual machines.
Social engineering is a non-technical strategy cyber attackers use that relies heavily on human interaction and often attempts to trick people into breaking established security practices.
Some examples of social engineering are:
Selecting an IT Security Tucson partner best suited to help you with both short- and long-term cyber security strategies can seem daunting. The best approach is to find a partner focused on the development of a long-term relationship rather than a short-term desire to earn an easy profit. If you're ready to start protecting your company's digital presence right away, contact us for a free Initial Security Assessment.