31 Jan 5 Bad Habits that compromise security of Mississippi Businesses
Inbound marketing allows us, Mississippi businesses, to reach people all over the world, however, we also recognize the dangers lurking in the online world. Today Matt Rose with VM2, a Mississippi based IT solutions company, shares some tips to keep your company safe.
Over the years we have noticed some familiar bad habits that seem to live in all of our new clients. These five habits may seem minor, but they have huge impact on your B2B company’s security, thus ultimately having an adverse affect on your bottom line.
1) Leaving your password and login info in your browser
Doing so causes risk on many levels, not limited to:
First, websites and browsers use that information to remember you, track your every move, then use and sell that information about you.
Secondly, if your computer is ever compromised, and most times you won’t know it has been until it is too late, your whole life could be destroyed when your identity is stolen.
Switch to using complex pass phrases-words which are put together to form sentences, random thoughts, songs, poems, etc. Then you won’t need to be store them to help you remember.
2) Using USB drives between work and other devices.
This is a very bad habit as many viruses travel on USB drives. Here’s how it works: You work on a document on the home computer for your job due the next morning, which is less secure and likely has malware on it. You pop in the USB drive, copy your file along with a virus or two, then insert it into your work computer. Your company network just got infected from a simple mistake which can turn out to be very costly.
3) Leaving your password written down on your desk, keyboard, monitor, bulletin board, etc.
When a thief gets a chance, the first thing they do is look for a password within your workspace. Hackers know how people tick and that’s why they are so very good. They might even use an insider to gain passwords. Custodial staff might be a good bet, but it could be a co-worker with an axe to grind. Use the tip in bad habit #1 so you can easily remember passwords without writing them down.
4) Using Facebook or Google to log in to other websites or apps.
A hacker looks at Facebook and considers how much easier it is to steal someone’s identity when they use Facebook or Google as a login for everything else. The hacker only has to crack one password and BAM they have everything. Once your identity is compromised, anything you have accessed with that login at your company could become fair game.
5) Attitude can be a company’s worst enemy; keep your ego at bay.
Some employees who think they know more than the IT staff and purposely circumvent security measures are far more harmful to an organization’s security than brute force hacking. Many think because they don’t have problems at home that are prevalent, they don’t need to be cautious at work either. However, these employees leave doors open with almost every click of the mouse. Preventative security measures are not on their radar. One of the most effective ways to keep employees adhering to security best practices is with ongoing training and strict consequences for deviation from security protocol.
To find out more visit our website at http://vm2neversleeps.com/blogcasts/ or follow us on linkedin.