(415) 246-0101

Microtechs Blog

Tip of the Week: Protect Your Online Identity With These 8 Tips

Tip of the Week: Protect Your Online Identity With These 8 Tips

The Internet has long been a great tool for business, but you can’t take advantage of it without putting your sensitive data at risk of threats, like hackers and malware. Granted, when it comes to cyber security, even the most cautious business will have a lot on their plate. We’ll go over eight of the most important security best practices, and how you can implement them for your business.

Use Proper Password Management
As one of the most important parts of protecting your infrastructure, password management can’t be ignored. Your passwords should be complex, using both upper and lower-case letters, numbers, and symbols. While this might make them difficult to remember, an enterprise-level password manager can make this task easier.

Check for Security Certificates
Before you enter sensitive credentials into any website, you should first check to see that it’s secured with a security certificate. In Google Chrome, you can check this by looking for the green padlock icon next to the URL in the address bar. In general, if you see a website with an https:// in the URL, it’s probably secure, but it’s still best to check the certificate.

Implement a Spam Filter
Hackers tend to use email as a scamming option. They will include links that lead to malicious downloads or fake websites that are designed to harvest your credentials. You can dodge many of these bullets by hovering over the link and checking to see where it goes, before you actually download the file or go to the website.

Be Careful of What You Download
Online “freeware,” will often come bundled with unwanted programs, like adware or browser add-ons. Many of these add-ons can be malicious in nature, so it’s best to always pay attention to end-user license agreement prompts, and to be on the lookout for what you are agreeing to. In other words, don’t leave checkboxes checked unless you actually want what they’re offering.

Always Keep a Firewall and Antivirus Solution Active
It’s of the utmost importance to always keep a firewall and antivirus running on your network and its endpoints. Firewalls can keep threats out of an infrastructure, while an antivirus can eliminate the threats that manage to make it through your defenses. Never disable your firewall for any reason.

Use Content Filtering
Most business owners associate content filtering with blocking social media and other time-wasting online content, but its use extends far beyond that. With content filtering, you can keep your users from accessing fake websites or those that contain malware that could negatively affect your infrastructure.

Identify Phishing Attacks
While a spam filter can keep some phishing emails at bay, others will undoubtedly still make it through the restrictions. Phishing attacks use deception to trick users into handing over important credentials or sensitive data. The hacker might even pretend to be someone else in order to extort information from you. Look for spelling errors or inconsistencies if you receive messages from unsolicited sources, and never let your guard down. You can even cross-check the email addresses or phone numbers that you have on file to check if the user is legit or trying to scam you.

Just Use Common Sense
People tend to act impulsively or irrationally when faced with threats like malware and viruses. Instead, you should devote your time and energy into resolving the problem, rather than panicking. Doing so can help minimize the damage done and avoid the threats altogether.

For more great security tips and tricks, reach out to Microtechs at (415) 246-0101, and subscribe to our blog.

Microtechs launches new website!
Disaster Recovery and Why it Matters to California...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, August 21 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Business Computing Tech Term Network Security Cybersecurity Smartphones Malware Hardware Microsoft Passwords Communication Wi-Fi Data Cloud Android Ransomware Internet Managed IT services Communications Mobile Devices Applications IT Support Backup Employer-Employee Relationship Business Management Google Software Small Business Hosted Solutions Network Business Intelligence Saving Money Blockchain Social Media Email Router Excel Data Backup Save Money Computer Business Data Breach Patch Management Data Protection Managed IT Service BDR Internet of Things Cortana Automation Wireless Charging Gmail Efficiency Analytics Virtual Assistant Data recovery Windows 10 Artificial Intelligence Virtualization IT Services Innovation Outsourced IT Browser Compliance Data Management VoIp Networking Collaboration Information Phishing User Tips Government Productivity VPN Tech Terms Remote Computing Cost Management Wireless Computers Smartphone Dark Web HIPAA Facebook Unified Communications Amazon Holiday Staff Internet Explorer Law Enforcement Downloads Hybrid Cloud Telecommute Database Reporting Network Attached Storage Bandwidth Sports Microsoft Teams Telecommuting Document Management Business Technology Environment Microsoft Office Battery IT budget Content Filtering Managed IT Services Hard Drive Twitter RAM Users eCommerce Physical Security Cloud Computing Threat User Tip Backup and Disaster Recovery Trends Cables Knowledge Data loss Cybercrime Medical IT Lead Generation Password Company Culture Paperless Office e-waste Analysis Tip of the week Processors Miscellaneous Inventory Workplace Tips Online Shopping Laptop How To Comparison Websites Printing Hard Drives A.I. Voice over Internet Protocol Office 365 Spam Tactics SaaS Connectivity Managing Stress Workers Digital disposal Managed Service IT Management Vulnerability User Security Mobile Security Plug-In Apple Specifications Safety Paper GDPR SSD Movies Telephony Virus Chrome Hackers Apps G Suite Millennials Sales Machine Learning Value Server Spyware Operating System Proactive IT Settings iPhone Conferencing Ink Storage WannaCry File Sharing Voice over IP Big Data Antivirus Maintenance Technology Tips Streaming Media Bring Your Own Device Edge Tablet Marketing PowerPoint HP Server Management Remote Monitoring and Management Office Dongle Thank You Error Congratulations Gadgets Alert Regulation