IBS
  • About
    • Mission and Vision
    • Company Profile
    • Customer Care
    • Team
    • Careers
    • Company News
    • Newsletter
    • Blog
  • Construction Management
    • Overview
    • Financial Management
    • Features
    • Data Control
    • SaaS
    • Content Hub
  • Property Management
    • Imperium
    • Financials
    • Features
    • Data Control
    • SaaS
    • Partners
    • Clients
    • Downloads
  • Managed IT Services
    • Overview
    • Clients
    • Partners
    • Services and Support
    • Why Outsource your IT?
    • Downloads
  • Contact
    • Contact Us
    • Request Info
    • Schedule Demo
  • Blog
Select Page

Cybercrime: The Importance of Knowledge, Preparation and Vigilance

In The News

< more news

Companies of All Sizes Must Take Steps to Protect Technology and Information
 By Michael Mullin, President
Integrated Business Systems
Totowa, N.J.

Cyber-safety, a common term used to describe a set of practices, measures and/or actions that protect technology and information from attacks, is a hot topic in business these days. Every company – whether large or small – is a target for cybercrime, and being prepared and vigilant has become an absolute necessity.

Understanding security threats is a good place to start. Today’s most common issues span five basic categories:

  • Viruses, which infect computers through email attachments and file sharing, can delete files, attack other computers and make systems run slowly.
  • Hackers are people who “trespass” into computers from remote locations. They can then cause the breached machine to malfunction, or use it to host a website, send spam or spread viruses.
  • Identity thieves obtain unauthorized access to personal information, such as social security and financial account numbers. They can then use this information to commit crimes such as fraud or theft.
  • Spyware, which is software that piggybacks on programs that are downloaded, gathers information about a user’s online habits and transmits personal information without their knowledge.
  • Ransomware is a more recent – and rapidly growing – threat. Perpetrators restrict access to software programs and files, most often by encrypting them, and then demand that the users pay a ransom to remove the restriction.

These issues are serious, and they are becoming more prevalent. Symantec, a cyber-security tool provider, reported that security breaches increased by 23 percent in 2014. More than 317 million new pieces of malware were created, averaging to nearly 1 million new threats each day.

For businesses, the reality of a security breach can be devastating and costly. An IBM study found the “average consolidated total cost of a data breach” in 2014 was $3.8 million, and that the cost for each stolen or lost record containing sensitive information was $154. Additionally, consider the costs associated with downtime resulting in lost access to the computing network, or the implications of the exposure of confidential customer data, company financial information and business intelligence.

How, then, can a company minimize its exposure? First, all devices connected to the business’ computing network should meet certain security standards. Second, and equally important, management should provide staff with the services and training needed to meet these cyber-safety standards.

In a recently published Employee Hack Guide, IBS outlines seven actions that help protect computers and data. In most cases, the implementation of these security measures takes only a few minutes.

  1. Install OS/software updates. Updates, sometimes called patches, fix problems with an operating system (OS) (e.g., Windows XP, Windows Vista, Mac OS X) and software programs (e.g., Microsoft Office applications). Most new operating systems are set to download updates by default. After updates are downloaded, users are asked to install them. Click yes!
  1. Run anti-virus software. To avoid computer problems caused by viruses, install and run an anti-virus program like Vipre, a product from ThreatTrack. Periodically, check to see if the anti-virus is up to date by opening the anti-virus program and checking the date of the last update.
  1. Prevent identity theft. Never give out financial account numbers, Social Security numbers, driver’s license numbers or other personal identity information unless the recipient is known. Never send personal or confidential information via email or instant messages, as these can be easily intercepted. Beware of phishing scams – a form of fraud that uses email messages that appear to be from a reputable business (often a financial institution) in an attempt to gain personal or account information.
  1. Turn on personal firewalls. Check computer security settings for built-in personal firewalls – and turn them on. Firewalls act as protective barriers between computers and the internet. Hackers search the Internet by sending out pings (calls) to random computers and wait for responses. Firewalls prevent computers from responding.
  1. Avoid spyware/adware. Spyware and adware take up memory, and can slow down computers and cause other problems. Use Spybot and Ad-Aware to remove spyware/adware. Both of these programs are available online for free.
  1. Protect passwords. Never share passwords. Establish a company “safe word” that a support technician requesting your work system login must know. Do not use one of these common passwords or any variation of them: qwerty1, abc123, letmein, password1, iloveyou1, (yourname)1, baseball1. Change your password periodically. When choosing a password, mix upper and lower case letters and use a minimum of eight characters.
  1. Back up important files. Reduce the risk of losing important files to a virus, computer crash, theft or disaster by creating back-up copies. Store back-up media in a secure place away from your computer, in case of fire or theft. Test your back up media periodically to make sure the files are accessible and readable.

Additionally, employees should work with their company’s in-house or third-party technical support coordinator before implementing any new cyber-safety measures. They should report any cyber-safety policy violations and security flaws/weaknesses they discover, as well as report any suspicious activity by unauthorized individuals in their work area. Finally, staff members should never install unnecessary programs on their work computers. Implementing these measures – and staying on top of them – can go a long way toward helping businesses fight common cyber-security threats and the resulting consequences.

< more news

Subscribe

* = required

Recent Posts

  • Resolve to Step Up Efficiencies and Tamp Down Waste in 2021 
  • Is Your Current Tech Platform Giving you a Headache? Sign Up for a Free Technology Evaluation and Find Out Why
  • Prepare for Tomorrow’s Unknowns by Future-Proofing Your Business   
  • Cybersecurity and Insider Threats: Your Company is just One Click Away from Vulnerability
  • Tech-Supported Agility is Key for Getting Back to Work in a New Reality

Categories

  • Managed IT Services
  • Cloud ERP
  • Property Management/Accounting Software
Integrated Business Systems Inc. 999 Riverview Drive, Totowa NJ 07512 (p) (973)-575-4950 (f) (973)-575-4953
Terms of Service  |  Privacy Policy  |  ©[wpsos_year] Integrated Business Systems Inc.
created by cpg interactive

Recent Posts

  • Resolve to Step Up Efficiencies and Tamp Down Waste in 2021 
  • Is Your Current Tech Platform Giving you a Headache? Sign Up for a Free Technology Evaluation and Find Out Why
  • Prepare for Tomorrow’s Unknowns by Future-Proofing Your Business   
  • Cybersecurity and Insider Threats: Your Company is just One Click Away from Vulnerability
  • Tech-Supported Agility is Key for Getting Back to Work in a New Reality

Archives

  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • March 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • November 2014
  • October 2014
  • July 2014
  • May 2014
  • January 2014

999 Riverview Drive
Totowa, NJ 07512
(973) 575-4950
sales@ibsre.com

  • Privacy Policy
  • Cookie Policy
  • Terms and Conditions

Designed by Elegant Themes | Powered by WordPress

x
Download the Whitepaper

Cloud ERP - a True Cloud Application

Fill in below to get this delivered straight to your inbox.