Micro Tech February 2018

The 5 Points of Data Security

3. An Industry-Standard Antivirus Program This software will constantly scan your system for suspicious and malicious code that exists in its database. Do note that at MicroTech, we absolutely do not believe in using a free antivirus to protect your business network. Such solutions don’t even meet basic PCI compliance standards. Shouldn’t that be a minimum requirement for protecting the longevity of your company? 4. Educate End Users Training your employees to sniff out and avoid malicious software, especially in the form of phishing, is the No. 1 way you can stave off a data breach. Unfortunately, it’s also the most difficult to implement. Give your team a crash course on the nature of phishing and red flags for suspicious emails. Also, ensure they avoid high-risk websites like gambling or movie- and music-sharing sites. 5. Backups, Backups, and More Backups A comprehensive backup strategy is a must, period. The choice is whether you’ll do an image-based backup, which stores the system in its entirety, saving quickly multiple times per day; a file-based backup, which saves specific files; or keep your backup in storage on the premises, on- or offline.

Today, ransomware is more prevalent than ever. Every day, small businesses across the country are attacked by malicious hackers. After penetrating the network — often through an employee clicking a cleverly disguised phishing email pretending to be a communication from a trusted member of the team — these cybercriminals block the entirety of the network’s data through complex encryption methods. Then they demand a steep ransom, usually thousands of dollars, for the safe return of the company’s data. Preventing these attacks may seem impossible, but there are ways to combat them before they become a serious problem. Here are five key points you’ll need to have on lockdown to prevent intruders from invading your network. 1. An Industry Standard Firewall Make sure you have a firewall that continually scans traffic. Among other key functions, this will serve as the gatekeeper for your network, opening and closing ports as necessary, and determining whether incoming emails are really what they claim to be. 2. Consistent Windows and Software Updates Regularly updating your operating system may seem tedious, but it’s key for your business’s digital security. Enable auto-updates for Windows and any software you regularly use, and be sure to download patches and updates as soon as they become available.

Have a Laugh!

Bacon-Wrapped TATER TOT BOMBS

Sure, your showoff pal can wrap a tater tot with a piece of bacon and call it “The Daniel,” but you can take it a step further. Prepare a couple batches of these savory snacks for your Super Bowl party or the next family get-together. Snag a few for yourself before they disappear!

Ingredients

2 cups frozen tater tots, defrosted 1 ounce sharp cheddar, cut into 1/4-inch squares

• • •

4 slices bacon, quartered 1/4 cup brown sugar 1 tablespoon chopped parsley

Directions

1. Heat oven to 400 F. Line a baking sheet with parchment paper and set aside. 2. Press a cheese square into each tot, then wrap with a piece of bacon. Dredge each tot in brown sugar.

3. Place tots seam side down on baking sheet. Bake for 20–25 minutes, using metal tongs to turn halfway through. 4. Garnish with parsley, if desired, and serve immediately.

(Recipe inspired by ThisGrandmaIsFun.com.)

page 3

Made with FlippingBook - Online catalogs