Home
Accounting Software & CRM
Introduction
Microsoft Business Central
Dynamics SL
Dynamics GP
Crystal Reports
PDF Explode
SQL Server Reporting Services
Business Performance Management Dashboard
Accounting & CRM Software Training
XLstatements
TechnologyEdge Outsource IT
Introduction
Cloud Computing
Security
Software Assurance
Windows Server 2019
Backup Systems & Data Recovery
Web Filtering
Internet
Microsoft 365
Recovery Planning
Remote Access
Virus, Spyware Inspection & Protection
SharePoint
Pilot DISPATCH Software
Support
Blog
About Us
Introduction
Contact Us
|
Login
X
Home
Accounting Software & CRM
Introduction
Microsoft Business Central
Dynamics SL
Dynamics GP
Crystal Reports
PDF Explode
SQL Server Reporting Services
Business Performance Management Dashboard
Accounting & CRM Software Training
XLstatements
TechnologyEdge Outsource IT
Introduction
Cloud Computing
Security
Software Assurance
Windows Server 2019
Backup Systems & Data Recovery
Web Filtering
Internet
Microsoft 365
Recovery Planning
Remote Access
Virus, Spyware Inspection & Protection
SharePoint
Pilot DISPATCH Software
Support
Blog
About Us
Introduction
Contact Us
Blog
About Us
/
Blog
Introduction
Contact Us
Categories
RSS
Announcements
27
Expand/Collapse
RSS
Dynamics SL
30
Expand/Collapse
RSS
Dynamics GP
48
Expand/Collapse
RSS
CRM
17
Expand/Collapse
RSS
Information Technology
100
Expand/Collapse
RSS
Local News
12
Expand/Collapse
RSS
Mobile
12
Expand/Collapse
RSS
Sage
26
Expand/Collapse
RSS
Security
35
Expand/Collapse
RSS
Tech News
103
Expand/Collapse
Archive
Expand/Collapse
2024
11
2024, August
1
2024, July
1
2024, May
2
2024, April
2
2024, March
2
2024, February
2
2024, January
1
Expand/Collapse
2023
9
2023, November
1
2023, August
1
2023, July
3
2023, June
2
2023, May
2
Expand/Collapse
2016
1
2016, February
1
Expand/Collapse
2015
18
2015, December
1
2015, October
1
2015, September
2
2015, August
2
2015, July
6
2015, June
3
2015, April
1
2015, February
1
2015, January
1
Expand/Collapse
2014
8
2014, July
1
2014, June
1
2014, May
1
2014, April
3
2014, March
1
2014, January
1
Expand/Collapse
2013
33
2013, December
3
2013, November
1
2013, October
4
2013, July
1
2013, June
2
2013, May
1
2013, April
4
2013, March
3
2013, February
5
2013, January
9
Expand/Collapse
2012
63
2012, December
5
2012, November
5
2012, October
7
2012, September
5
2012, August
4
2012, July
2
2012, June
4
2012, May
5
2012, April
8
2012, March
4
2012, February
8
2012, January
6
Expand/Collapse
2011
50
2011, December
2
2011, November
3
2011, October
5
2011, August
1
2011, July
6
2011, May
6
2011, April
5
2011, March
11
2011, February
5
2011, January
6
Tags
Microsoft
Dynamics
Accounting Software
GP
Microsoft Dynamics
Sage
Dynamics GP
CRM
SL
Information Technology
Microsoft GP
Cloud
ERP
Great Plains
MAS 90
Microsoft Dynamics SL
Dynamics SL
Business Intelligence
Tech news
GP 2013
Technology News
10 Ways to Prevent a Data Breach and Protect Your Small Business
No business is too small for a hacker!
22 July 2015
Author: Anonym
Number of views: 2257
0 Comments
This article from http://www.theglobeandmail.com , informs us on 10 ways to protect your small business. Big businesses are not the only ones who can get hacked - small businesses are also a target. Make sure your business is protected and read the list of 10 steps to help your company stay safe!
1. Think beyond passwords. Never reuse them and don’t trust any website to store them securely. To increase the level of security, set up a two-factor authentication for all your online business accounts. This authentication relies on something only you should know (your password) and authenticates something only you should have (typically your phone) to verify your identity.
2. Stop transmission of data that is not encrypted. Mandate encryption of all data. This includes data at “rest” and “in motion.” Consider encrypting email within your company if personal information is transmitted. Avoid using WiFi networks, as they may permit interception of data.
3. Outsource payment processing. Avoid handling credit card data on your own. Reputable vendors, whether it’s for point-of-sale or web payments, have dedicated security staff that can protect data better than you can.
4. Separate social media activity from financial activity. Use a dedicated device for online banking and other financial activities, and a different device for email and social media. Otherwise, just visiting one infected social site could compromise your banking machine and sensitive business accounts.
5. “Clean house” and update procedures. Evaluate your assets and valuable data to identify where your organization is most at risk. It’s important to reduce the volume of information you keep on hand (only keep what you need!) and properly destroy all paper documents, CDs/DVDs and disks before disposal. Consider assessing your business’s email infrastructure, browser vulnerability, and ID system. Do not use Social Insurance Numbers as employee ID numbers or client account numbers. You should also question the security posture of your business lines, vendors, suppliers or partners.
6. Secure your browser. Watering holes – malicious code installed on trusted websites – are a common method of attack against businesses. How do you know which websites to trust? Focus on keeping up-to-date with the latest version of your browser. Then, test your browser’s configuration for weakness.
7. Secure your computers and operating system. Implement password protection and “time out” functions (requires re-login after period of inactivity) for all business computers. Require strong passwords that must be changed on a regular basis. Also be sure to update all operating systems, which have major security improvements baked in. It’s far easier to break into older operating systems like Windows XP or OS X 10.6.
8. Secure your internet router. Make sure someone can’t intercept all the data sent through it. Consider configuring your wireless network so the Service Set Identifier (SSID) – the name the wireless network broadcasts to identify itself – is hidden.
9. Safeguard and back up your data. Lock physical records containing private information in a secure location and create backups. These should be encrypted and off-site in case there’s a fire or burglary.
10. Educate and train employees. Establish a written policy about data security, and communicate it to all employees. Educate them about what types of information are sensitive or confidential and what their responsibilities are to protect that data. In addition, restrict employee usage of computers for only business purposes. Do not permit use of file sharing peer-to-peer websites or software applications and block access to inappropriate websites.
http://www.theglobeandmail.com/report-on-business/small-business/sb-digital/10-ways-to-prevent-a-data-breach-and-protect-your-small-business/article25089314/?utm_content=18611969&utm_medium=social&utm_source=twitter
Print
Categories:
Information Technology
,
Security
Tags:
Rate this article:
5.0
Please
login
or
register
to post comments.