Simple Security Tips for the Non-Technical

These days the media is constantly reporting on new vulnerabilities and cyber attacks that devastate business. With the influx of cyber criminals with access to debilitating software, business owners are forced to take evasive security actions in order to protect their sensitive data. While a complete and comprehensive security system is ideal, it can often take time to create a fully secured system for your business. Luckily, there are a few non-technical steps any user can take to make sure their information can’t get into the wrong hands.

Cover Up the Webcam

Despite how it sounds, it might not be too crazy to think that someone can spy on you through your computer’s webcam. In fact, there have been actual reports of this happening on several different occasions. Hackers are able to take control of a user’s webcam, often as a way to gain access to personal information, check for signs of a location, and even spy on personal interactions.

Luckily, all it takes to stop a hacker is to cover up the webcam when it is not in use. It can be as easy as covering it up with a piece of thick tape, though you can find cheap and effective webcam covers at technology or hardware stores.

Use a Privacy Shield

There are many professionals who work on-the-go, meaning they’ll have to find a way to take their work with them anywhere. However, using mobile devices while out in public leaves you vulnerable to prying eyes.

If you have to work on sensitive data in public, it may be beneficial to invest in a privacy shield. These are similar to a screen protector, but with an added security feature. Privacy shields will limit the angle of viewable screen, making it so only the user can see the information. Privacy filters are recommended on work devices, but can also be used on personal devices to shield sensitive data.

Switch to a Physical Authentication

These days, many companies are advocating for a two-step authentication when logging into an account. However, there are still ways that hackers can get around these heightened security measures. For example, many two-step authentications use mobile phones to text specialized codes that will unlock an account. If a hacker had access to a user’s mobile phone, either physically or by hijacking it, they can easily get through to the user’s account.

To combat this, users can get an authentication key, such as a USB or Bluetooth. These are physical keys that allow only the user to access the accounts.

For more information on how to secure your information contact Info Advantage at (585) 254-8710 today.

4 Most Common Ways Businesses Lose Data
Newly Found Cisco Vulnerability Dubbed "Critical" ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, August 18 2018

Captcha Image

Support Options

  • Phone Support +

    Speak to a support team member on the phone!

    Phone: (585) 254-8710
    Fax: (585) 254-8766

  • Ticket By Email +

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal +

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security technology Tip of the Week Best Practices Privacy Current Events technology solutions malware backup Hackers Business Management Ransomware Productivity cyber attacks Business practice Software Network Security Innovation Business Continuity Mobility Hardware Disaster Recovery Microsoft cloud Windows 10 Mobile Devices Computer Avoiding Downtime Internet business Office tips hardware solutions Business Computing Efficiency Quick Tips Operating System Laptop Education Flexibility Wi-Fi Health cyber criminals Law Enforcement data breach email Passwords Social Personal Information Risk Management Money Mobile Computing cloud capabilities Saving Money Information Technology IT Support Automation Office 365 servers Identity Theft Application Smartphone voip Facebook History IT Services IT Communication data internet user Small Business Humor Miscellaneous Upgrade Antivirus hardware refreshes emails Automobile Alert downtime Managing Stress Legal Software-based phone systems ecommerce content time intel BDR iPhone Cybercrime Router threats phone systems Apps Virtual Reality Government Wireless byod Scalability Internet Protocol Text Messaging Encryption cars Video Games Employer-Employee Relationship Recovery virtualized servers Google Battery Update Reputation Workplace Tips Remote Computing Data recovery spam HaaS Point of Sale holiday How To business continuity plan Artificial Intelligence Marketing Password Server Net worth Gadgets Virtualization ATMs Managed IT Services Windows Microsoft Office Search Relocation User Tips Hosted Solutions Users USB Private Cloud Entertainment Smartphones VPN Social Media End of Support computer network Touchpad Worker Commute Instant Messaging Robot Telephone Systems Internet Exlporer PDF Black Market Work/Life Balance VoIP right Telephony Advertising Google Drive Hosted Solution

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name