Is Your Clients’ Private Digital Information Safe on Your Network and Devices?

Published on: December, 18th 2014 | Under: Technology & Tools

Share this article: Share on Facebook0Tweet about this on TwitterShare on Google+0Share on LinkedIn0Pin on Pinterest0Share on Reddit0Digg this

The theft of digital information has become the most commonly reported type of criminal fraud. Surprisingly, the theft of digital information has actually surpassed physical theft. When JP Morgan Chase was hacked earlier this year, it compromised sensitive data for over 76 million worldwide customers.

Cybercrime Has Become a Big Danger for Small Businesses

While financial institutions and big retailers have been strengthening their networks against attacks, cybercriminals have begun targeting less well-defended small businesses. Small businesses are attacked every day, it just doesn’t make the news like a massive data breach at Target or Home Depot. If you aren’t convinced that it’s a major problem, review the following information based on a 2013 survey conducted by the National Small Business Association:

  • Cyber security icon44% of small businesses have been victims of cyber attacks. The average cyber attack costs a small business $8,700.
  • In 2011, businesses with less than 250 employees accounted for 18% of cyber attacks. In 2013, that number rose to 30%.
  • Businesses must often pay to notify customers of a data breach and also pay for credit monitoring for customers with compromised information. Companies are potentially liable for damages in lawsuits brought by customers with compromised information.

Don’t Gamble with Your Clients’ Loyalty by Putting Their Security at Risk!

Follow these recommendations to increase the security of your network and to safeguard your clients’ valuable personal and financial information:

  • Cybersecurity Awareness: Awareness, education and training is actually the first line of defense when it comes to protecting your business and clients from cybercrime. Establish a cybersecurity plan and policies that requires the use of passwords; guidelines for handling client data and customers’ financial information; and appropriate internet use while on the job.
  • Secure Your Wi-Fi Network: Password protect access to the router on your network. A common misconception is that simply having a router on your network will provide the protection you need. Without a password on the router, it is like putting a door on your office but not locking it.
  • Authentication and Passwords: Each employee must have unique passwords and passwords should be changed every three months. Multi-factor authentication adds greater protection because it requires additional information to gain entry. When working with vendors that are handling your sensitive financial information, ask if they use multi-factor authentication. If not, you might want to work with a different vendor.
  • Secure Transactions: Protect client financial information from theft during online transactions by using encryption software. Encryption software also protects your business’ financial accounts, personnel files, product information and other highly sensitive data. Isolate payment systems from each other and don’t surf the internet from the computer you use to process payments.
  • Clean Machines: Always use the latest operating system, security software and web browser. These will provide the best protection against online threats including viruses and malware. Block spam with a reliable spam filter, plus your e-mail will be easier to manage.
  • Firewall: Consider using a reliable firewall that prevents outsiders from accessing data on your private network. If your employees work from home, be sure that their home system is also firewall protected.
  • Mobile Devices: Require users to password protect their mobile devices, encrypt their data and install security apps to prevent cyber criminals from stealing information while the device is on a public network.
  • Control Business and Client Information: Know exactly how and where critical information is stored, how it is used and how it is protected. Administrative privileges are only for key personnel. Limit employee access to data and always use strong and individualized passwords. Lock laptop equipment when not in use. Use a reliable backup system that is at minimum HIPPA compliant.

Play It Safe!

Computer Troubleshooters can help you fight cybercrime by strengthening your business’ network with a variety of security products and solutions to cover all areas that are potentially at risk in your business. Computer Troubleshooters can also help you to establish a cybersecurity plan and policies for your business. Give your local Computer Troubleshooters office a call and one of their technology professionals will be happy to help you.


About Kim Weinberger

Kim Weinberger is the National Director of Business Development - Computer Services for Computer Troubleshooters Global. Kim has a long-standing relationship with Computer Troubleshooters that began when she and her husband bought a technology franchise in Fond du Lac, WI, in 2003. In addition to her role as a franchise owner and operator, Kim also served as a Regional Director for four years and then as an Assistant National Director for five years. In 2012, Kim became the Director of Operations for the Computer Troubleshooters Global franchise and the Geeks On Call franchise, which has since merged with Computer Troubleshooters. In 2016, Kim's role shifted to managing the growth and development of computer services for Computer Troubleshooters Global, as well as the CPR Cell Phone Repair franchise.