Blog
home
  • Register

Data Net Blog

By accepting you will be accessing a service provided by a third-party external to https://www.4datanet.com/

How to Protect Your Business as You Reopen

How to Protect Your Business as You Reopen

As remote operations continue for many, while many are working to return to the official workplace, security and business continuity are more important to your business than ever. Let’s go over a few things you need to address to successfully reopen without exposing your business to undue risks.

Protecting Your Business by Defending Your Team

Whether your staff is operating in-house or remotely, they need to have the proper protections in place to preserve your data security. Reminding your team of the following best practices is a great way to start, as many attacks now rely on the end user making a mistake.

  • Maintain password hygiene: Passwords (and passphrases even more so) remain the peak way that a user can keep their accounts and data safe. However, this requires the user to follow best practices when it comes to their passwords themselves, such as:
    • Not reusing your passwords
    • Updating your passwords frequently
    • Not sharing your passwords
    • Using a password manager
  • Only use secure and trusted connections: A hugely important facet to your security, whether in or out of the office, is how your team is accessing the Internet. The network they use needs to be a secured one, and they should be using a VPN (Virtual Private Network) for extra protection against snooping.
  • Push software updates: Whether you are literally instructing your employees to install updates as they become available or you are actively implementing them yourself, the software (including the firmware on certain hardware solutions) should be updated at every opportunity.
  • Use MFA: MFA, short for multi-factor authentication, is a security strategy that goes an additional step (or “factor”) past the username-password combination we are all so accustomed to. When your solutions are protected with MFA, your users will need to confirm that they are who they say they are with an additional bit of evidence, such as a code generated by a smartphone app or even a physical token. In requiring this, you make it far less likely that someone without authorization will be able to log in as one of your verified users.

Protecting Your Business by Securing Its Location

Of course, not all cybercrime has to happen digitally. There are many ways that a cybercriminal can get their paws on your data that you will need to contend with—especially if your office is or will be vacant for some time yet. While many may overlook the physical aspect of cybersecurity, you shouldn’t.

  • Require authentication for access: Consider what could happen if someone came into your business when nobody else was there, and saw all the expensive technology just sitting there, unprotected. Whether they were interested in your data or the hardware itself, you can’t just leave it vulnerable. The same goes for different departments and ranks inside your business (just to be safe). Make sure that your resources are protected so that only the people who need them can access them.
  • Keep an eye on your business: Access logs, digital video recordings, and other surveillance tools can help you keep watch over your business, allowing you to focus your thoughts elsewhere. Not only can these help provide evidence of whatever issue happens on your business’ property, they can also work as a pretty effective deterrent against attacks in the first place.

Protecting Your Business by Insulating Its Data

Finally, one of the biggest risks to your business continuity is the fact that your data is inherently fragile. Not only can it be deleted, the media upon which it is stored can be damaged or destroyed. The result is the same: you’re out an indeterminate amount of data. Therefore, you need to take steps to avoid that outcome.

  • Keep track of your data: If you plan on keeping your data safe, you need to know exactly what data you have. Take inventory of the data that you need to keep and establish what will be required to protect it from threats and infiltration. This is especially important when sensitive information (like financial details or personally identifiable information) is involved.
  • Restrict access to those who need it: The fewer people who have access to data, the inherently more secure that data will be. Therefore, make sure that your staff is only able to access data that they will implicitly require for their responsibilities. This will help protect you from a variety of risks.
  • Maintain a data backup: Finally, you need to be sure that—should some disaster befall your business—your data won’t be irrevocably lost to you. A data backup that meets accepted best practices is an effective way to ensure this. We always recommend that you subscribe to the three-two-one rule (at least three copies of your data, in at least two places, at least one of which being offsite). The cloud is often a good fit for these needs.

This can be a lot to process, especially when you will already have your hands full as you reopen. Data Net is here to help. For more information about how we can assist your business moving forward, reach out to us at (760) 466-1200.

Tip of the Week: Communication Practices to Suppor...
To Reopen Safely, Business Will Need to Embrace Te...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, July 10, 2020

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Data Efficiency Privacy Communication Malware Hackers IT Support Small Business Smartphones Innovation User Tips VoIp Communications Google Cloud Mobile Device Workplace Tips Hardware Email Microsoft Software Computer Tech Term Users Managed IT Services Internet Business Management Cybersecurity Android Business Outsourced IT Windows 10 Mobile Devices Ransomware Cloud Computing Collaboration Hosted Solutions Social Media Miscellaneous Backup Passwords IT Services Data recovery Browser Smartphone Wi-Fi Saving Money Data Backup Phishing Managed Service Apps Upgrade Network Information Gadgets Holiday Facebook Internet of Things Networking Windows Applications Bandwidth Microsoft Office Wireless Automation Managed IT services Patch Management Employer-Employee Relationship Access Control Gmail Chrome Data Breach VPN Marketing BDR Blockchain Business Intelligence Word Conferencing Router Mobile Office Quick Tips Managed IT Service Save Money Voice over Internet Protocol Laptop Compliance Apple Value Going Green Bring Your Own Device iPhone Cost Management Data Security Remote Monitoring and Management Cortana RAM Tech Terms Mobility Education Remote Monitoring Computers Government Remote Computing Medical IT Wireless Charging Batteries Virus How To Office Virtual Assistant Employee-Employer Relationship Retail Twitter Covid-19 Artificial Intelligence Windows 7 Connectivity Telephone System Virtualization Company Culture Disaster Recovery Password Physical Security Office 365 Business Continuity Data Protection Server Excel Payment Cards Settings Paperless Office Telephony Health Social Network Scam G Suite Healthcare Business Technology Data Management Remote Work Processor Net Neutrality Windows Server 2008 R2 Update Virtual Private Network Vulnerabilities Scams Sports Reporting Knowledge Battery Remote Hard Drive Recycling Threat WhatsApp Safety Computer Repair Solid State Drive Fleet Management Website Authorization Lead Generation PCI DSS Display Amazon Data loss IT Human Resources Trends Error Taskbar Licensing Hybrid Cloud Outlook Database Customer Relationship Management Cryptocurrency Project Management News Big Data Technology Tips Remote Workers Network Attached Storage Environment Processors Personal Information Printing Edge eCommerce IT Service Hard Disk Drive Multi-Factor Authentication Microsoft Teams Regulations Compliance Training Benchmarks Live Streaming HP Spam Hosted Desktop Managed Services Provider A.I. IT budget Help Desk National Security Tech Support Cables Profitability Cybercrime Law Enforcement Telecommuting Managed Service Provider Search SaaS e-waste User Tip Spyware E-Commerce Bitcoin Paper Dongle Sales Online Shopping Mobile Video Mobile Device Management Content Filtering Meetings Security Cameras Risk Management Document Management Antivirus Firewall Electronic Health Records Vendor Movies Remote Support Touchscreen Inventory Management Alert Vulnerability Eliminating Downtime Machine Learning Tactics Co-Managed IT Time Management Insurance Cleaning GDPR Backup and Disaster Recovery Holidays Managing Stress disposal Payment Ink Tablet Recovery Customer Service WannaCry Printer Wearables Maintenance Plug-In Staff User Security Profiles Microsoft Office 365 IT Management Mobile Security Remote Working Updates BYOD Workers Humor Chrome OS File Management Streaming Media Storage Hard Drives Comparison OneNote Troubleshooting Server Management Tip of the week instant Messaging Threats PowerPoint Analytics Virtual Reality HIPAA Congratulations Internet Explorer Proactive IT Digital Websites Voice over IP Shadow IT Employees Distribution Unified Communications Authentication Operating System Certification Travel Wireless Internet Telecommute File Sharing Millennials Memes Current Events Downloads Botnet Dark Web SSD Specifications Analysis WiFi Printers Financial Thank You Regulation

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123