Security is about more than million-dollar firewalls; often, it’s about the small, daily habits that keep small issues from escalating into major problems. Today, the lines between personal and professional lives are blurrier than ever, and a compromised personal device could also mean access to an entire corporate network.
Fortunately, it doesn’t take long to get your security in order, and we’ll prove it with this seven-day digital hygiene sprint. Surely you can spare a week to get your security in order, right?
Here’s the roadmap:
Most business executives use their personal devices for work email. If your personal Apple or Google account is compromised, your work data could also be at risk. Take steps to introduce multi-factor authentication (MFA) for your personal primary email and social media accounts. Use an authenticator app rather than SMS codes for greater security.
How many contractors, former employees, and one-time partners have access to your business? Take time to get permissions under control. Open your primary shared drive (OneDrive, Dropbox, SharePoint, etc) and review “Shared Folders” or “External Access.” Revoke access for anyone who isn’t currently working on a project.
Stop using the same password for all of your accounts; it just makes you more vulnerable to credential stuffing attacks. Identify your ten most sensitive accounts, then change those passwords to unique passphrases. Store these passphrases in a secure password management tool. Then, repeat this process until you’ve gone through all of your online accounts.
Your home Wi-Fi could be one of your weakest links. If you’re still using the default passwords and network names, you need to change them now. Log into your home router settings, then update the firmware and change the Wi-Fi password. Make sure your guest network is also enabled for non-work devices.
Quick fixes can escalate into shadow IT if they aren’t addressed properly. Since these tools lack enterprise-grade encryption, you want to take action to limit the use of such solutions. List out every third-party app that you’ve used in the past 30 days, then ask if the task could be completed with a company-owned and approved tool instead. If not, you can ask your IT department to look into the solution and see if it’s an appropriate option.
When a breach occurs in the middle of the night, do you know who you can call to address it? Confusion is how hackers get you, and you want to mitigate it as much as possible. Save your IT provider’s emergency support number in your phone and make sure everyone on your leadership team knows who is responsible for what in the event of a breach.
What happens to your data and access if your device is lost or stolen? Take some time to ensure remote wipe is enabled for all of your mobile devices through a mobile device management tool. Finish out the week by verifying that Find My Device settings are active.
Just like that, you’re in a better place than you were before; and it didn’t even take that much time or effort on your part.
If you’re ready to get started, reach out to Managed IT Force. We’re happy to walk you through any and all steps necessary to protect your business. Learn more by calling us at 724-473-3950.
About the author
Dan has 25 years of progressive experience in the IT industry. He has led three successful companies focused on small and medium business IT solutions since 1997.
Tag Cloud
Comments