Cii Technology Solutions Blog

Top Cybersecurity Mistakes You and Your Company Could be Making

As cyber attacks continue to become more of a threat, companies across the globe are beefing up their security and implementing new tactics. Due to improvements in security, attacks have recently begun targeting the human side of companies. Cyber criminals manipulate vulnerable employees to get to sensitive data in your company. You may be unknowingly participating in bad cybersecurity behaviors, so we are breaking down some common mistakes that you could be making.

Weak Passwords

It seems like password requirements are getting more complicated every day.  But these efforts are made to help keep your information safe and secure.  When creating your password, use terms that are easy for you to remember with information that would be difficult for a hacker to guess.  Avoid easy to guess items like names and birthdays. Try using your initials along with your kids initials and add the year you got your dog as a password. It will be very difficult for a hacker to put all of this information together (if they can even find it). For the best protection, use reputable password creation and storage services.

Ignoring Multifactor Identification

Many people opt out of this service but this is a huge mistake. As hacking tactics become more sophisticated, additional measures are necessary to secure your information. The extra layer can include a question only you will know, a text to your phone, or an email sent to you.

Not Updating Systems and Programs

Delaying updates is a great way to get hacked. While your old version may be one that you are more comfortable with, using an outdated version of software is exactly what hackers are looking for. Older versions can have bugs and flaws that hackers can easily exploit. Keeping your systems and programs up to date is the best way to prevent this from ever being a problem.

Clicking unknown emails, links, attachments, and pop-ups

Trust your gut, if something doesn’t feel right, don’t trust it.  Don’t think that email seems right?  Don’t click the link. Phishing and social engineering attacks may trick you into thinking the emails are legitimate. Just be sure to look for the tell-tale signs of an email sent to scam you, such as poor grammar and sentence structure, an incoherent email/page, urgency, and past experiences.

Using your work computer for personal reasons

A good rule of thumb is to ensure you have a machine dedicated solely to work, keeping personal use separate. Keep all personal usage and surfing on your personal computer. A hack is more likely to occur on an unauthorized site during personal time. It’s the unauthorized surfing that poses the greatest risk to accidentally stumble onto an untrustworthy site or link.

Going for a cheap security provider rather than a practical one

Cybersecurity can seem like an expensive and daunting subject to tackle.  But cutting corners may not be in your best interest.  There are different levels of security, and security stacks can be customized based on your industry and business.  Bringing in a 3rd party firm to help you decide on the right services can make a world of difference and keep your company from becoming the next headline.

Cybersecurity Training

If you haven’t had at least one session showing your employees how to correctly protect themselves, schedule it immediately. While your employees are smart people, they may not be knowledgeable in cybersecurity. As cyber attacks shift to targeting the human aspect of your company, these training sessions are becoming a necessity. Your IT team can correctly train your employees, demonstrating safe habits and how to keep from becoming victims of an attack.

Set up a Security Policy and Strategy

Having a set of guidelines on what is acceptable behavior on company machines and online browsing can save your company from a large headache.  Be sure to clearly communicate your internet and use policy to your employees.  A lax policy and no monitoring can leave your company vulnerable.  Develop a backup strategy to protect your data should a breach occur, and ensure your employees know how to respond to such an event.

Thinking You Can Stop Every Attack

The truth is that you can’t stop every attack from coming in.  There will always be exceptions that flow through. That is why it is up to the employees to be the last line of defense and know how to avoid these attacks.

Using traditional backups instead of the cloud

While many business owners think that having a backup with their on-premises servers or a flash drive is safer than cloud backups, this is incorrect. The truth is that anything a hacked computer has physically touched, such as on-premises servers or a flash drive, can also be infected. Cloud servers are not physically connected to the business, keeping them safe from the damaged environment. Cloud infrastructure is what experts are recommending as the way of the future.

Still worried your company is in jeopardy or have any questions about cloud solutions? Call us today for a FREE assessment of your security risks and what solution could work for you!

Admin@cii