Info Advantage Blog

Simple Security Tips for the Non-Technical

These days the media is constantly reporting on new vulnerabilities and cyber attacks that devastate business. With the influx of cyber criminals with access to debilitating software, business owners are forced to take evasive security actions in order to protect their sensitive data. While a complete and comprehensive security system is ideal, it can often take time to create a fully secured system for your business. Luckily, there are a few non-technical steps any user can take to make sure their information can’t get into the wrong hands.

Cover Up the Webcam

Despite how it sounds, it might not be too crazy to think that someone can spy on you through your computer’s webcam. In fact, there have been actual reports of this happening on several different occasions. Hackers are able to take control of a user’s webcam, often as a way to gain access to personal information, check for signs of a location, and even spy on personal interactions.

Luckily, all it takes to stop a hacker is to cover up the webcam when it is not in use. It can be as easy as covering it up with a piece of thick tape, though you can find cheap and effective webcam covers at technology or hardware stores.

Use a Privacy Shield

There are many professionals who work on-the-go, meaning they’ll have to find a way to take their work with them anywhere. However, using mobile devices while out in public leaves you vulnerable to prying eyes.

If you have to work on sensitive data in public, it may be beneficial to invest in a privacy shield. These are similar to a screen protector, but with an added security feature. Privacy shields will limit the angle of viewable screen, making it so only the user can see the information. Privacy filters are recommended on work devices, but can also be used on personal devices to shield sensitive data.

Switch to a Physical Authentication

These days, many companies are advocating for a two-step authentication when logging into an account. However, there are still ways that hackers can get around these heightened security measures. For example, many two-step authentications use mobile phones to text specialized codes that will unlock an account. If a hacker had access to a user’s mobile phone, either physically or by hijacking it, they can easily get through to the user’s account.

To combat this, users can get an authentication key, such as a USB or Bluetooth. These are physical keys that allow only the user to access the accounts.

For more information on how to secure your information contact Info Advantage at (585) 254-8710 today.

4 Most Common Ways Businesses Lose Data
Newly Found Cisco Vulnerability Dubbed "Critical" ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, February 15 2019

Captcha Image

Support Options

  • Phone Support +

    Speak to a support team member on the phone!

    Phone: (585) 254-8710
    Fax: (585) 254-8766

  • Ticket By Email +

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal +

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security technology Tip of the Week Best Practices Privacy Current Events Hackers technology solutions malware backup Software Business Management Ransomware Productivity cyber attacks Business practice Microsoft cloud Network Security Business Continuity Mobility Innovation Disaster Recovery Hardware Office tips business Business Computing hardware solutions Efficiency Quick Tips Windows 10 Mobile Devices Computer Avoiding Downtime Internet data breach email Passwords Social Operating System Flexibility Education Laptop Wi-Fi Health cyber criminals Law Enforcement data History internet user Humor Miscellaneous Small Business Antivirus Upgrade Personal Information Risk Management Mobile Computing Money cloud capabilities IT Support Office 365 Identity Theft Saving Money Information Technology Automation Application servers voip IT Services Smartphone Facebook IT Communication Google Remote Computing Workplace Tips How To Data recovery HaaS Point of Sale Reputation holiday Artificial Intelligence spam Password Virtualization business continuity plan Managed IT Services Microsoft Office Server Net worth Automobile Marketing ATMs Windows Search Managing Stress Gadgets hardware refreshes emails Legal Software-based phone systems Alert downtime Cybercrime ecommerce BDR content phone systems Router time intel iPhone threats Apps Virtual Reality Wireless Scalability Internet Protocol Government Text Messaging Encryption byod Video Games Recovery cars Update Employer-Employee Relationship Battery virtualized servers Touchpad Instant Messaging Telephone Systems PDF Black Market Work/Life Balance Robot Internet Exlporer VoIP right Telephony Google Drive Advertising User Tips Hosted Solution Relocation Hosted Solutions USB Smartphones Entertainment Users Private Cloud VPN End of Support Social Media computer network Worker Commute

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name