These days the media is constantly reporting on new vulnerabilities and cyber attacks that devastate business. With the influx of cyber criminals with access to debilitating software, business owners are forced to take evasive security actions in order to protect their sensitive data. While a complete and comprehensive security system is ideal, it can often take time to create a fully secured system for your business. Luckily, there are a few non-technical steps any user can take to make sure their information can’t get into the wrong hands.
Cover Up the Webcam
Despite how it sounds, it might not be too crazy to think that someone can spy on you through your computer’s webcam. In fact, there have been actual reports of this happening on several different occasions. Hackers are able to take control of a user’s webcam, often as a way to gain access to personal information, check for signs of a location, and even spy on personal interactions.
Luckily, all it takes to stop a hacker is to cover up the webcam when it is not in use. It can be as easy as covering it up with a piece of thick tape, though you can find cheap and effective webcam covers at technology or hardware stores.
Use a Privacy Shield
There are many professionals who work on-the-go, meaning they’ll have to find a way to take their work with them anywhere. However, using mobile devices while out in public leaves you vulnerable to prying eyes.
If you have to work on sensitive data in public, it may be beneficial to invest in a privacy shield. These are similar to a screen protector, but with an added security feature. Privacy shields will limit the angle of viewable screen, making it so only the user can see the information. Privacy filters are recommended on work devices, but can also be used on personal devices to shield sensitive data.
Switch to a Physical Authentication
These days, many companies are advocating for a two-step authentication when logging into an account. However, there are still ways that hackers can get around these heightened security measures. For example, many two-step authentications use mobile phones to text specialized codes that will unlock an account. If a hacker had access to a user’s mobile phone, either physically or by hijacking it, they can easily get through to the user’s account.
To combat this, users can get an authentication key, such as a USB or Bluetooth. These are physical keys that allow only the user to access the accounts.
For more information on how to secure your information contact Info Advantage at (585) 254-8710 today.
Speak to a support team member on the phone!
Phone: (585) 254-8710
Fax: (585) 254-8766
Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.
Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)