5 Cyber Security Resolutions to Start 2016 Off Right

On January 7th, 2016, posted in: Personal Tech Tips by Comments Off on 5 Cyber Security Resolutions to Start 2016 Off Right

Don't fall victim to cybercrime

In 2015, cyber security came into the spotlight when more than 17 million American records were exposed to cyber-attacks, according to the Identity Theft Research Center.

The worst attack included the breach of the Office of Personnel Management, which exposed the personal information of 21.5 million people. Unfortunately, experts believe 2016 won’t be any better, so the time to take security seriously is now. Follow these 5 simple, everyday best practices to minimize the risk of your identity and information being compromised this year.

1) Backup Your Files

Data backup MilwaukeeBacking up your files is one of those things most people put off – until it’s too late. Don’t wait until your mobile device is stolen or your computer is fried.

Many of today’s backup solutions can make the process easy and painless. It’s important to note these backup solutions are for personal use, not business. Learn more about data backup solutions for business on our website.

For important files, it’s best to save at least three copies in two different formats, with one of those copies stored off-site.

For example, save one copy of the file where you can quickly retrieve it (i.e. your computer or phone), save another in a secure, cloud based backup system and save a third copy to an external hard drive.

2) Stop Reusing Passwords

Data security Milwaukee, WIYes, you’ve heard this one before. But have actually followed this advice? In the past, you may have used the same generic password for all your profiles, due to the hassle of keeping track of too many passwords.

But using the same password for every account puts your entire online presence at risk. All a hacker needs to do is guess one password correctly, and they have access to all your online accounts – especially if you have a go-to username you always use.

It’s best to create passwords that contain numbers, lower and capital letters and symbols. You can use a random password generator to come up with a unique combination or use these password management apps to remember and securely store all your passwords – so you don’t have to!

Want to know how secure your password REALLY is?

Plug your password into this tool and it will tell you how quickly a hacker could crack it.

3) Frequently Check Your Privacy Settings

data recovery milwaukee wiMany people make the mistake of assuming their privacy settings will remain in place no matter what. But ultimately, technology is in a constant state of change. When a social network undergoes a major update, your privacy settings may also change.

What this means, is your private profile suddenly could be public for anyone to view. For this reason, it’s a good idea to make a habit of checking your privacy settings about once a month.

Start by Googling your name (and state/city if needed) and see what comes up. Click on your profile and you’ll see what information is public. If changes are needed, learn how to hide your profile again.

4) E-Cycle Your Electronics

Throwing electronics in the trash is not only potentially hazardous for the environment, but it’s dangerous for YOU since old tech can retain important information. Anyone could grab your computer from the curb and get access to sensitive information you thought you erased from the computer.

Not sure how to e-cycle? Find resources for e-cycling your electronics here.

5) Use Secure Wi-Fi Networks

Beware of the risk with free wi-fi

Photo credit: Flickr

Free, open Wi-Fi networks are everywhere. You might be tempted to connect to the Wi-Fi at your local coffee shop, a bookstore, or your favorite casual restaurant. Connecting to these organizations’ Wi-Fi and logging onto any website with your private information is risky.

As a rule, you should never conduct online banking or make purchases through a public Wi-Fi network. Ever. The chance of your computer being hacked far exceeds the chance of your home being burglarized.

This is a big business, so it’s best to play it safe and follow these best practices.

  1. Change your mobile device settings so you don’t automatically log onto Wi-Fi hotspots.
  2. If you have the option of connecting to a secure or non-secure Wi-Fi network, always choose the secure network, even if you have to pay for it.
  3. Be sure you are connecting to the right network. In large, public places like the airport, there are many different Wi-Fi networks available – making this location a prime target for hackers. When in doubt, ask the proprietor.

Bonus Tip: Organize Your Inbox

How to achieve inbox zeroChances are, there are a handful (or more) of lingering emails in your inbox that you still haven’t dealt with over the holiday break.

Emails accumulate quickly and if you don’t have a solid technique to manage your inbox, you’ll start the year off feeling frustrated and overwhelmed.

Decluttering your inbox not only takes a huge weight off your shoulders but it also helps you become more productive in your personal and professional life.

Productivity guru Merlin Mann developed the “Inbox Zero” approach, which involves rigorous email management with a focus on keeping the inbox empty or almost empty at all times. Mann believes that because time and attention are limited, when an inbox is confused with a “to do” list, productivity suffers. Use the inbox zero technique and start the year off right.

Cybercrime is a BIG business and hackers become more sophisticated each year. By making just a few of these small changes, you’ll significantly reduce the risk of a hacker stealing your sensitive information and putting you at risk this year.

Have You Registered for a
No-Obligation FREE Network Discovery?
Our Network Consultant will conduct a full audit of your network and discuss with you – minus technical jargon – ways your business can fill in any gaps and resolve any vulnerabilities or loopholes that might compromise your business and potentially cost you thousands of dollars down the road.

Your FREE Network Discovery includes: An audit of your Current Network, Infrastructure, Server(s), PC’s, Backup, Security Performance, Reliability, followed with Q&A Session with our Network Consultant.

During your "non-tech talk" Q&A session we'll discuss:

- Your company's susceptibility to viruses 
- Security of YOUR confidential records
- Your disaster recovery backup plan
- What to do if your system fails

 
Just type your name and email address below to get started!

 We respect your privacy. We will NEVER sell, rent or share your email address.
Read previous post:
Business Continuity - Plan Ahead
The Top 5 Trends in 2016 That Will Change the Way You Do Business

1) Mobile Device Management (MDM) What it is: If you’re new to mobile device management (MDM), chances are, you’ll hear...

Close