Cyber Security Month 2019: Secure It.

m3 networks IT services cyber security month 2019

CSM- Secure It.png

When it comes to cyber-attacks, businesses have a lot to lose. In 2018, the business sector experienced 571 breaches- the largest amount ever recorded. How were so many businesses vulnerable to attacks? The answer is simple—human error.

Cyber-criminals take advantage of any human error they can find within your business- patches, employees failing to update software, opening infected links- to hack your systems and access your information.

What are some ways you can “Secure It” and combat human error to protect your company’s data? Here are 5 simple tips:

1.       Treat business information as personal information. Business information typically includes a mix of personal and proprietary data. While you may think of trade secrets and company credit accounts, it also includes employee personally identifiable information (PII) through tax forms and payroll accounts. Do not share PII with unknown parties or over unsecured networks.

2.       Technology has its limits. As “smart” or data-driven technology evolves, it is important to remember that security measures only work if used correctly by employees. Smart technology runs on data, meaning devices such as smartphones, laptop computers, wireless printers, and other devices are constantly exchanging data to complete tasks. Take proper security precautions and ensure correct configuration to wireless devices in order to prevent data breaches. For more information about smart technology see the Internet of Things Tip Card. Read the Internet of Things Tip Sheet for more information.

3.       Be up to date. Keep your software updated to the latest version available. Maintain your security settings to keeping your information safe by turning on automatic updates so you don’t have to think about it and set your security software to run regular scans.

4.       Social media is part of the fraud toolset. By searching Google and scanning your organization’s social media sites, cybercriminals can gather information about your partners and vendors, as well as human resources and financial departments. Employees should avoid oversharing on social media and should not conduct official business, exchange payment, or share PII on social media platforms. Read the Social Media Cybersecurity Tip Sheet for more information.

5.       It only takes one time. Data breaches do not typically happen when a cybercriminal has hacked into an organization’s infrastructure. Many data breaches can be traced back to a single security vulnerability, phishing attempt, or instance of accidental exposure. Be wary of unusual sources, do not click on unknown links, and delete suspicious messages immediately. For more information about email and phishing scams see the Phishing Tip Sheet.

For more cyber security tips and information, check out the National Cyber Security Alliance ( ) and stay tuned the rest of Cyber Security Month.