Vector Tech August 2018

''60%of the time, it’ s not some fancy tool that allows criminals to circumvent your defenses — it’ s your employees letting them in.''

continued from cover...

should make you mad. It may be that the entirety of your company’s data, everything you’ve worked so hard to build over years of blood, sweat and tears, could be guarded behind a password as simple as “123456.” Make sure you train your employees on safe password practices. That means mandatory password changes to key business accounts every few months, each of them containing letters, numbers and symbols, preferably without any real words at all. It’s a small change, but it can drastically increase your odds against data breaches. 2. MAKE CYBER SECURITY PART OF YOUR COMPANY POLICY If your business is going to survive a digital onslaught, safe online practices for your employees need to be more than a recommendation. They need to be mandatory company policies. Every new and existing employee needs to know what’s expected of them and what the consequences will be if they deviate from guidelines. For example, when an update comes through for a key piece of software, it needs to be installed

importantly, you need to analyze the habits of your personnel and whether or not they’re complying with your high standards of cyber security. 4. TRAIN YOUR PEOPLE As they say, forewarned is forearmed. This is never truer than when defending your business from data breaches. With comprehensive cyber security awareness training, outlining everything from the biggest digital threats to post-breach best practices, you can turn your biggest security liability into your greatest defense. If employees know the ins and outs of hackers’ tricks, it becomes exponentially more difficult for hackers to trick them and find a way into your network. With all four of these steps, it can be difficult to determine just how to implement these policies within your organization – much less what should be included – but luckily, we can help. Contact us to find out how we can help you put a strong data security employee training program in place and patch any holes in your barriers before they become an issue.

immediately. Have a set procedure in place for them to follow if they encounter a suspicious e-mail or potentially malicious link. These and other practices, when set in stone, ensure that employees remain personally invested in protecting your company. 3. CONDUCT A SECURITY AUDIT The best way to suss out any employee vulnerabilities, though, will always be to do a thorough security audit of all your systems. This means investigating the hardware and software you’re using on a daily basis, sure, but most

Vector News


Who wants to win a $25 gift card?

You can be the Grand Prize Winner of this month’s Trivia Challenge Quiz! Just be the first person to correctly answer this month’s trivia question and receive a $25 gift card to Amazon!

The term ‘GUI’ stands for?

1. Graphing

3. Gorgeous

Ultimate Interface

Unidentified Idiot

2. Graphics

4. Graphical

Top: Will Nobles with Caitlin Jenner Bottom: Will Nobles with George Ross

Unused Input

User Interface

Will Nobles speaking at the Harvard Club

Ready? Call us right now with your answer! (877) 468-1230

Will Nobles spoke at the Harvard Club of Boston in July this year. He also got to interview Caitlyn Jenner and George Ross. What an honor!

2 | 877.468.1230

Made with FlippingBook flipbook maker