Protect Yourself and Your Busines

Published on: December 11th, 2014

In both our professional and private lives, each of us needs to assume responsibility for our online activities. These responsibilities involve a combination of equipment maintenance and software updates coupled with appropriate online behavior and a constant vigilance against criminal activities. We suggest that you start with this brief checklist:

Maintain a Clean Machine by running the most recent operating system, security software, apps and web browser as a defense against online threats such as viruses and malware.
Firewalls and Encryption should be in use by businesses to secure their internet connection. Educate employees about passwords and internet security guidelines.
Spam and Phishing are hazards you can avoid. Don’t open e-mailed attachments from strangers and never click on unknown links contained within e-mails. Enable the filters on your e-mail programs to screen for spam. Beware of messages indicating upgrades, technical updates and special offers. These tactics are no longer limited to e-mail, so be vigilant when on social networking sites.
Backup Your Computer and Mobile Device in the event that your equipment is physically stolen or lost. You might have lost the device, but the data is preserved by the backup system. The theft of smartphones has become a major crime. Be aware of where your smartphone is at all times. If your phone is missing, consider using locator apps and you can even use a remote wipe to clear information from your missing phone.
Secure Your Device by activating the key-lock feature and using a passcode. A particularly complex password is suggested. Change your passwords periodically.
Safeguard Your Personal Information when using unsecured, public connection by avoiding apps or websites that require your password. These are the types of connections accessed in airports, hotels, coffee shops and libraries. You might want to reconsider doing your online banking in an airport.
Manage Your Social Network Privacy by reviewing the latest changes to privacy settings and be sure you are using these settings properly. Think twice about what you are posting on these sites – more people might see this than you think. Educate your children about social media behaviors. Hide your e-mail address from online profiles.
Disposal of Older Computers is another source for the theft of data. Remember when you delete files, the information is not actually erased. The hard drive should be overwritten, degaussed or physically destroyed. Never dispose of a computer that hasn’t been secured. Your information could end up in the hands of a criminal. Computer Troubleshooters in Northern NJ comes in while you’re busy running your business. We take care of computer support and so much more — offering strategic advice, technological expertise, and partnership you can only get from a trusted advisor. Please feel free to email us at [email protected] or call us at 973.628.0041

SHARE IT

share in twittershare in twittershare in twitter

You might also like

With an evolving business comes expanding technological needs. If your business is sending you any of these signs that it’s time to update your technology.