Info Advantage Blog

Info Advantage was formed in 1992 for the purpose of specializing in Information Technology consulting, which encompasses business solution development, software development, and platform support from IBM’s midrange to a growing number of Intel based solutions.

Simple Security Tips for the Non-Technical

These days the media is constantly reporting on new vulnerabilities and cyber attacks that devastate business. With the influx of cyber criminals with access to debilitating software, business owners are forced to take evasive security actions in order to protect their sensitive data. While a complete and comprehensive security system is ideal, it can often take time to create a fully secured system for your business. Luckily, there are a few non-technical steps any user can take to make sure their information can’t get into the wrong hands.

Cover Up the Webcam

Despite how it sounds, it might not be too crazy to think that someone can spy on you through your computer’s webcam. In fact, there have been actual reports of this happening on several different occasions. Hackers are able to take control of a user’s webcam, often as a way to gain access to personal information, check for signs of a location, and even spy on personal interactions.

Luckily, all it takes to stop a hacker is to cover up the webcam when it is not in use. It can be as easy as covering it up with a piece of thick tape, though you can find cheap and effective webcam covers at technology or hardware stores.

Use a Privacy Shield

There are many professionals who work on-the-go, meaning they’ll have to find a way to take their work with them anywhere. However, using mobile devices while out in public leaves you vulnerable to prying eyes.

If you have to work on sensitive data in public, it may be beneficial to invest in a privacy shield. These are similar to a screen protector, but with an added security feature. Privacy shields will limit the angle of viewable screen, making it so only the user can see the information. Privacy filters are recommended on work devices, but can also be used on personal devices to shield sensitive data.

Switch to a Physical Authentication

These days, many companies are advocating for a two-step authentication when logging into an account. However, there are still ways that hackers can get around these heightened security measures. For example, many two-step authentications use mobile phones to text specialized codes that will unlock an account. If a hacker had access to a user’s mobile phone, either physically or by hijacking it, they can easily get through to the user’s account.

To combat this, users can get an authentication key, such as a USB or Bluetooth. These are physical keys that allow only the user to access the accounts.

For more information on how to secure your information contact Info Advantage at (585) 254-8710 today.

4 Most Common Ways Businesses Lose Data
Newly Found Cisco Vulnerability Dubbed "Critical" ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 22 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Support Options

  • Phone Support +

    Speak to a support team member on the phone!

    Phone: (585) 254-8710
    Fax: (585) 254-8766

  • Ticket By Email +

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal +

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security technology Tip of the Week Best Practices Privacy Current Events Productivity technology solutions Hackers malware backup cloud Software Business Management Ransomware cyber attacks Business practice Network Security Business Continuity Mobility Disaster Recovery Microsoft Innovation Hardware Business Computing Windows 10 Efficiency Computer Avoiding Downtime Internet Mobile Devices business Quick Tips hardware solutions Office tips Flexibility email Social data breach Operating System Laptop Health Law Enforcement Education cyber criminals Passwords Wi-Fi voip phone systems IT Small Business Identity Theft Upgrade Antivirus Communication Risk Management servers IT Support Office 365 Miscellaneous Humor data Application Personal Information internet user Mobile Computing Money Information Technology Saving Money Automation IT Services Smartphone cloud capabilities Facebook History byod cars Virtual Reality Artificial Intelligence Scalability Managed IT Services Internet Protocol Workplace Tips Encryption Server Data recovery Gadgets Update spam Router Net worth How To iPhone emails hardware refreshes Government ecommerce Microsoft Office intel time threats Managing Stress Cybercrime Google HaaS Reputation virtualized servers Video Games Marketing Recovery Search Windows Alert holiday Battery Hosted Solutions Remote Computing business continuity plan ATMs Point of Sale Apps Password Wireless downtime content Virtualization Automobile Text Messaging Legal Software-based phone systems Employer-Employee Relationship BDR Internet Exlporer Robot Advertising Hosted Solution Worker Commute Relocation VoIP right Instant Messaging Smartphones Private Cloud Users Work/Life Balance Social Media VPN Touchpad computer network PDF Google Drive Telephone Systems Black Market User Tips Telephony End of Support Entertainment USB

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name