Info Advantage Blog

Simple Security Tips for the Non-Technical

These days the media is constantly reporting on new vulnerabilities and cyber attacks that devastate business. With the influx of cyber criminals with access to debilitating software, business owners are forced to take evasive security actions in order to protect their sensitive data. While a complete and comprehensive security system is ideal, it can often take time to create a fully secured system for your business. Luckily, there are a few non-technical steps any user can take to make sure their information can’t get into the wrong hands.

Cover Up the Webcam

Despite how it sounds, it might not be too crazy to think that someone can spy on you through your computer’s webcam. In fact, there have been actual reports of this happening on several different occasions. Hackers are able to take control of a user’s webcam, often as a way to gain access to personal information, check for signs of a location, and even spy on personal interactions.

Luckily, all it takes to stop a hacker is to cover up the webcam when it is not in use. It can be as easy as covering it up with a piece of thick tape, though you can find cheap and effective webcam covers at technology or hardware stores.

Use a Privacy Shield

There are many professionals who work on-the-go, meaning they’ll have to find a way to take their work with them anywhere. However, using mobile devices while out in public leaves you vulnerable to prying eyes.

If you have to work on sensitive data in public, it may be beneficial to invest in a privacy shield. These are similar to a screen protector, but with an added security feature. Privacy shields will limit the angle of viewable screen, making it so only the user can see the information. Privacy filters are recommended on work devices, but can also be used on personal devices to shield sensitive data.

Switch to a Physical Authentication

These days, many companies are advocating for a two-step authentication when logging into an account. However, there are still ways that hackers can get around these heightened security measures. For example, many two-step authentications use mobile phones to text specialized codes that will unlock an account. If a hacker had access to a user’s mobile phone, either physically or by hijacking it, they can easily get through to the user’s account.

To combat this, users can get an authentication key, such as a USB or Bluetooth. These are physical keys that allow only the user to access the accounts.

For more information on how to secure your information contact Info Advantage at (585) 254-8710 today.

4 Most Common Ways Businesses Lose Data
Newly Found Cisco Vulnerability Dubbed "Critical" ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, October 23 2018

Captcha Image

Support Options

  • Phone Support +

    Speak to a support team member on the phone!

    Phone: (585) 254-8710
    Fax: (585) 254-8766

  • Ticket By Email +

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal +

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security technology Tip of the Week Best Practices Privacy Current Events technology solutions Hackers malware backup Productivity cyber attacks Business practice Software Business Management Ransomware Innovation Hardware Microsoft Network Security cloud Business Continuity Mobility Disaster Recovery Office tips Business Computing Computer Avoiding Downtime Efficiency Internet business Mobile Devices Quick Tips Windows 10 hardware solutions Health Law Enforcement email Passwords Social Education cyber criminals Flexibility Wi-Fi data breach Operating System Laptop Communication Saving Money Information Technology Antivirus Automation Smartphone Facebook History Personal Information cloud capabilities Small Business Risk Management Humor Miscellaneous servers Mobile Computing Upgrade IT IT Support data Identity Theft Office 365 Application internet user voip Money IT Services Battery business continuity plan Update Government Net worth Remote Computing ATMs hardware refreshes emails HaaS Point of Sale downtime How To ecommerce Password Employer-Employee Relationship content Artificial Intelligence Managed IT Services Microsoft Office Google time intel Virtualization Automobile threats Managing Stress Reputation Legal Software-based phone systems BDR byod Cybercrime Router Marketing phone systems Server cars Gadgets Windows Search virtualized servers Apps Virtual Reality Wireless Alert Scalability Internet Protocol Workplace Tips Data recovery Video Games Text Messaging Encryption holiday iPhone spam Recovery Social Media Telephone Systems End of Support Instant Messaging User Tips Work/Life Balance PDF Black Market Telephony Entertainment Touchpad Google Drive VPN Robot Internet Exlporer Hosted Solutions USB computer network Smartphones Advertising Hosted Solution Relocation Users Private Cloud Worker Commute VoIP right

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name