Cyber Security Smarts
Cyber Security Smarts.
At Elevated Technologies, we are not under any misguided impressions that we can completely eliminate human error with regard to the IT networks we maintain; human error is inevitable. Our goal is to mitigate as much risk as possible by not only protecting the systems we maintain with state of the art software and programming but also educating our users on best business practices and specific situations to watch out for. Empower yourself and consider the following tips when interacting online as a token of our good faith in data security.
Security Tips for Users
You have the most control of all!
Here are some fundamental practices to develop:
- Lock your computer when you are away from it.
- Disconnect your computer from the internet when you are not using it.
- Evaluate your security settings periodically: select options that meet your needs without putting yourself at risk.
- Always use a credit card over a debit card when purchasing online and check your statements regularly. When on sites with sensitive information, make sure that is the only window open.
- Check privacy policies and do business with reputable vendors.
- Use and maintain anti-virus, firewall, and anti-spyware software.
- Practice good password management by using a strong mix of characters, don’t use the same password for multiple sites, and keep it secret.
- Use portable devices in accordance with corporate security policies, keep them secure at all times to prevent theft or loss and report any misfortune promptly.
- Handle confidential information with care, using proper classification codes along with storage and disposal methods.
- Provide feedback to current solutions and security policies to IT or management professionals.
- Align with an IT professional that can provide expert knowledge on best business practices.
- Operate with virtual private network (VPN) technology to create secure internet connections to and from your private network.
- Continually educate employees on cyber security practices.
- Develop and Evaluate Bring Your Own Devices (BYOD) policy.
- Change the default password on Admin accounts and always run computers as non-admin when possible.
- Update systems and software when needed.
- Use secure wireless networks by enabling encryption, changing the default password, change the SSID name, and turn off SSID broadcasting. (use MAC filtering feature instead)
- Report cybercrime to the Internet Crime Complaint Center.
- Properly configure and patch operating systems, browsers, and other software programs on workstations, servers, and mobile devices.
- Allow access to systems and data only to those who need it and protect those access credentials.
|As an industry expert, CHAMP is here to answer any questions you might have in regards to IT services and cloud computing solutions.|
|Stop. Think. Connect. |
You may not remember all of these tips all of the time, and that’s to be expected. Simply remember to stop, think, and then connect. This mentality was coined by the Department of Homeland Security who developed a campaign around these three simple words to create a safer cyber world. If something does not feel right, if you have questions or concerns then stop; step away and consult your IT Ally.
|ET Ally Safety Program|
Cyber security is a shared responsibility that has to be recognized within all operating levels of business. You are not alone! Align with Elevated Technologies. We have strong industry accreditations, extensive technical knowledge, and excellent help desk / customer service representatives to help guide your business out of unsafe cyber situations.
|About Elevated Technologies|
There are many actions that can be taken on the technical side of the fence to reduce the risk of a security breach. We seek out the most current technical information and we are working in the tech trenches every day. The proper foundation of an IT network can mean everything. A firewall is designed to stop hackers from gaining access to your network. If the firewall is not set up correctly, hackers have an unlocked door straight to your data. Timely scans for Malware and Spyware need to be established so that if a breach occurs, there is an alert. Content filtering is designed to prevent employees from going to sites that are riddled with risk. All of these precautions can be taken at the firewall level and there are also measures that can be taken further within the network structure to provide additional layers of protection and reduce vulnerabilities. Our industry expertise combined with our ET Ally Safety Program mitigates as much risk as possible when doing business in this increasingly connected world.