Computer Transition Services, Inc.
  • About Us
  • What We Do
  • The CTSI Experience
  • Resources
  • Locations
    • Lubbock, TX
    • Amarillo, TX
    • Abilene, TX
    • Midland, TX
    • Plano, TX
  • Careers
  • Contact Us
  • CTSI Referral Program
  • Support
  • Pay My Bill
  • 1.800.OUR.CTSI
  • Search
  • Menu Menu
cybersecurity

4 cybersecurity resolutions you should make this New Year

December 27, 2018/in Blog, Cybersecurity /by CTSI

It’s that time of year again. The time when we decide to do better next year, create a plan to do so, and give it the good old college try.

This year, in between vowing to get in shape or read more books, consider adding in some cybersecurity resolutions.

These 4 resolutions will help keep you and your business safe online this year.

Resolve to Require Better Passwords

Experiencing a data breach is a disastrous event, so it’s important to prevent them in any way possible.

With this in mind, did you know that over 60% of data breaches are due to weak or stolen passwords? It certainly puts into perspective just how important secure passwords are.

Unfortunately, having specific requirements for employees can result in passwords even they don’t remember. One business owner remedied this by giving his staff the following guideline on creating their passwords:

favorite keyboard symbol + first two letters in the name of a loved one + an important phone number

For instance, while @Ma8675309 would be nearly impossible to guess, it’s simply an employee’s favorite symbol, the first letters of their sister Marie’s name and a phone number made immortal by Tommy Tutone.

Of course, you can add additional security with multi-factor authentication. If a hacker can beat both of these cybersecurity measures, they certainly earned their data breach.

Related Articles:

  • The Quick Guide to Creating Completely Secure Passwords
  • Stick with Security: Require Secure Passwords and Authentication

I Resolve to Dispose of Data Safely

Data is the holy grail which successful businesses drink from, so why would you ever dispose of it?

As it turns out, data disposal doesn’t necessarily mean you’re getting rid of it. Whether you’re trashing old documents, discarding end-of-life electronics or merely deleting a duplicate file, you’re in the act of disposing data.

When it comes down to it, proper disposal of these items is one of the biggest cybersecurity necessities out there. This means shredding paper documents, emptying “Recycle Bins” and completely formatting soon-to-be-disposed electronics that may contain company data.

When going through this process, make sure those doing the disposing are properly trained and have the appropriate clearance.

Related Article:

  • Stick with Security: Secure Paper, Physical Media, and Devices

Be Wary of Free WI-Fi

When employees are working in the office, they shouldn’t be utilizing free Wi-Fi at all. Of course, the business world has evolved to the point where many people don’t work in the office.

In fact, 70% of the world’s employed population works remotely at least once every week.

This makes protection of data while working remotely a huge concern. And even if your employees abide by all other security protocols, they are putting your data at risk if they utilize unsecured Wi-Fi networks. In fact, this action is widely considered one of the most common threats to business cybersecurity.

Avoiding this hazard starts with appropriate training and employment agreements. If you’re especially concerned that your workers might be leaching off the local coffee shop, it wouldn’t hurt to invest in mobile hotspots.

Related Articles:

  • How to Protect Your Data When You’re Working Remotely
  • Cybersecurity Tips to Stop the Most Common Threats to Your Business

Resolve to Keep Social Media Private

You might be wondering how much your social media account could have to do with organizational cybersecurity. Unfortunately, the answer is “a lot.”

Phishing scams have evolved in leaps and bounds over the years, and cybercriminals would love to gain access to the information you share on these platforms.

Using things as seemingly innocuous as your friend list, birthdate, hometown, and phone number, criminals can gain access to just about any digital system you utilize. Avoid this mishap by making your social profiles viewable by only friends and family.

It is worth noting, though, that not even this proactive measure can fully protect you.

In mid-2018, for instance, a glitch at Facebook made 14 million private profiles public for over a week. This means it’s probably smart to simply leave out as much information as possible on these profiles.

Happy New Year!

On the first of every January, we are granted an opportunity to accomplish the goals that evaded us all year long. While we should certainly shoot for the stars with exercise plans and giving up cigarettes, it’s foolhardy to overlook the safety of our business networks.

If you make the right cybersecurity resolutions for the new year and stick to them, you’ll take a big step towards organizational security in 2020.

Tags: cybersecurity, data protection, modern workplace, tips & tricks
Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Vk
  • Share on Reddit
  • Share by Mail
You might also like
consulting 4 ways to be good to your PC
Ransomware The SMB Owner’s Guide to Stopping Ransomware
world security 7 bizarre security analogies about preventing ransomware hacks
password screen Fight breach fatigue: Protect your network endpoints today
woman with coffee Three Trends Transforming the Modern Workplace
security network Tailor Your Digital Security Strategy for Different Departments
The Quick Guide to Creating Completely Secure Passwords
Cybersecurity Tips Cybersecurity tips to stop the most common threats to your business

Categories

  • Blog
  • Business Communication
  • Business Tips
  • Cybersecurity
  • Education
  • Government
  • Healthcare
  • Managed IT Services
  • Networking
  • News
  • Press Release

Subscribe to Our Newsletter

Computer Transition Services, Inc.

Lubbock
3223 S Loop 289
Suite 556
Lubbock, TX 79423

806-793-8961

Amarillo
817 S Polk St
Suite 101
Amarillo, TX 79101

806-318-7650

Midland
3300 N A St
Building 6, Suite 130
Midland, TX 79705

432-253-5210

Plano
7250 Dallas Pkwy
Plano, TX 75024

806.793.8961
1.800.OUR.CTSI

 

 

 

Sitemap
About Process Services Testimonials Contact Us Resources Support Careers Transparency in Coverage
this business is lubbock safe logo
Social Media
facebook logo twitter logo linkedin logo
Comp TIA Security TRUSTMARK log
© Copyright - Computer Transition Services, Inc. All rights reserved 2021 | Sitemap | Privacy Policy
Top Data Breaches of 2018 and What We’ve Learned computer screen showing a data breach enpoints 4 Endpoints That Should Always Be Protected
Scroll to top