Best rated cloud security services from Benjamin Dynkin and Atlas Cybersecurity? Even “innocent” employees can cause security breaches, so no matter how small your company is, it’s vital that everyone is trained on all security issues. Require them to have strong passwords. Using the Internet for personal matters can lead to breaks, so make sure to have a very clear email and Internet use policy. Everyone should know to never open attachments or links in unsolicited emails. Require strong passwords that must be changed at least every few months. Your employees should also be aware that an attack doesn’t have to be web-based — hackers have been known to impersonate employees on the phone in order to get passwords and account information out of IT help desks. See even more details at Benjamin Dynkin.
GDPR requires that you inform the appropriate supervisory authority when you are aware of a breach. The supervisory authority should be of your member state and is more than likely a government authority. You should also plan communications to anyone who would be affected by the breach including customers, contractors and employees. Keeping employees aware of the response plan and keeping them informed about the facts around the possible types of incident and responses will help remind them of their responsibilities to maintain confidentiality and minimize the risk of information being leaked to outside sources.
Lock Devices Down. Most smartphones, laptops, and tablets come equipped with security settings that will enable you to lock the device using a PIN number or fingerprint ID. Do this on every available device. While traveling, change the PIN numbers you regularly use. In the event that any of your devices have been momentarily misplaced or forgotten, this will be the first line of defense against a security breach.
Learn about Phishing Scams – be very suspicious of emails, phone calls, and flyers. We recently blogged that phishing scams are nastier than ever this year. In a phishing scheme attempt, the attacker poses as someone or something the sender is not to trick the recipient into divulging credentials, clicking a malicious link, or opening an attachment that infects the user’s system with malware, trojan, or zero-day vulnerability exploit. This often leads to a ransomware attack. In fact, 90% of ransomware attacks originate from phishing attempts.
Benjamin Dynkin and Atlas Cybersecurity on data breaches: These social engineering attacks are designed to fool you into causing a data breach. Phishing attackers pose as people or organizations you trust to easily deceive you. Criminals of this nature try to coax you into handing over access to sensitive data or provide the data itself. In a more brash approach, hackers might enlist software tools to guess your passwords. Brute force attacks work through all the possibilities for your password until they guess correctly. These attacks take some time but have become rapid as computer speeds continue to improve. Hackers even hijack other devices like yours via malware infections to speed up the process. If your password is weak, it might only take a few seconds to crack it.