AZCOMP Technologies IT March 2018

(855) 556-4677

MARCH 2018

Empowering Small Practices To Deliver The Best Care THE GREATEST THREAT TO YOUR NETWORK Might Be Your Staff


BE WARY OF DIGITAL IMPOSTORS Many hackers gain access to networks by pretending to be a legitimate user. Imagine that a nefarious user stumbles upon an employee’s Facebook password. All of a sudden, it’s impossible for you to tell that your employee isn’t actually who they say they are. They ask you for a password. You give it to them. What seemed like a simple interaction was actually a hack taking place. The best way to avoid this fate is to ask a question that you’re certain an impostor couldn’t answer or to make the person show up in person to get the password. You never know who’s hiding behind that account. If you have even the slightest doubt, it’s better to be safe than sorry. KEEP YOUR TEAM IN THE KNOW What these strategies demonstrate is that your network is only as strong as its least-informed user. When you don’t teach your team about the latest cybercrime strategies, you put your entire organization at risk. Just as important as teaching them about attacks is teaching them about defense. Make security patch updates mandatory and give your staff a crash course in password strategies. You wouldn’t believe how many businesses have lost money because one staff member makes their password “password.” You should also create a system that makes it easy for anyone to raise the alarm. Should somebody in one department receive a suspicious email, you need to report the danger to the entire team. At AZCOMP, we are technology consultants who offer services to maintain and monitor your entire system. Additionally, we are happy to train you and your team on how to avoid data breaches and security vulnerabilities. Call us to learn more about our unlimited monitoring, maintenance, and support plans. –Byron Adams

Close your eyes and picture a hacker. Odds are the figure in your mind is wearing a hoodie (and maybe a Guy Fawkes mask), typing furiously as they attempt to breach a major corporation or government agency. They operate in the shadows, either alone or as part of an organization. Their goal is to cause chaos and destabilize major economic and political powers. To be fair, this type of hacker does exist, but they are few and far between. Your garden-variety hacker is much less skilled than the stereotype. They are petty criminals trying to squeeze a few thousand bucks from an unsuspecting small business. These hackers aren’t even close to capable of breaking into a ‘mainframe’ or even a well- secured database. In fact, they might not know how to code at all. Instead, they rely on the mistakes made by innocent users to gain access to your company’s network. According to IBM’s 2016 Cyber Security Intelligence Index, 60 percent of the time, all it takes is an unwitting insider to provide information that hackers use to break in. HUMAN ERROR IS A HACKER’S TOOL Your average hacker may not be able to break into a database, but they rarely need to do that. Often, a cybercriminal’s greatest skill is exploiting human vulnerability. They’re not unlike people who hang out around public ATMs in hopes that someone will forget their card. Except in these cases, the ATM is on the internet. Every day, internal emails are mistakenly addressed to the wrong people, sensitive info is inadvertently made public, and employees unknowingly click on malicious links. These tactics don’t require an advanced knowledge of computer science. They prey on human weakness and faulty training. If your people don’t know to be vigilant against these attacks, they may end up accidentally compromising your network. Making things even easier for criminals is the fact that we all have dozens of online accounts tied to our name. All they need to do is gain access to one to begin wreaking havoc. Which brings us to our next point.

Published by The Newsletter Pro •

(855) 556-4677 AZCOMP Technologies, Inc. • 1

Made with FlippingBook flipbook maker