Get a Quote

One of Your Best Cybersecurity Defenses? Your Employees Part 2

Last month, we discussed three defenses that your business can take to ensure you and your employees are protected from cybersecurity threats. By keeping an organized, clean desk, recognizing common red flags for phishing attempts, and creating strong passwords, your employees become not only another line of defense but your BEST line of defense. Now, while most teams are working remotely or in a hybrid state – transitioning between the office and home – limiting your employees’ exposure to cybersecurity threats is critical. Here are two more recommendations on how to protect your business and your team. And, if you missed our previous three recommendations, you can access the blog here. 

Cybersecurity Defense #4: Protect Your Most Used Tool – Your Phone

They have become such a regular part of our everyday lives, it’s easy to forget that our mobile devices are security breaches waiting to happen. Especially when employees are using their mobile phones more than ever (in the absence of a desk phone, or being able to walk down the hall to an employee’s office), it’s important to protect this device from being a target. There are some obvious no-no’s, such as not having a strong PIN, password, or other security measures to open your phone, however, there are also some less known ways to keep your phone safe.
Here are a few other tips you may not have considered:

● Keep Them Clean: Just as your employees are likely sanitizing the outside of their phones, they need to consider sanitizing the inside as well. Phones are mini-computers and files/data can pile up after a while. Use a malware scanner or antivirus program just as you would on a laptop in order to seek and destroy any viruses that may be lingering.
● Beware of Free Wi-Fi: Using free Wi-Fi in a coffee shop is a welcomed bonus for remote workers; however, it’s important to know the dangers of accessing an open Wi-Fi network. Hackers in the vicinity of the area can use that network to tap into other users, ultimately accessing their mobile data. When possible, always use a secured network or a hotspot.
● Have a Backup For Missing Phones: Many of our digital tools today including smartwatches and smart home devices have a “Find My Phone” feature. However, make sure you download the correct corresponding app to your phone in order to fully appreciate the benefits of this service. When your iPhone or Andriod goes missing – even if it’s just in your coat pocket in the hallway – you’ll be significantly relieved that you had this safety measure in place.

Cybersecurity Defense #5: Browse the Internet – Smartly

Between malvertising (malicious code disguised to look like an ad), social media scams, and targeting software, when you are searching on the internet, you are opening yourself – and your technology – to security threats. Of course, hackers are becoming smarter every day, so it’s difficult to capture all of the ways that a person could be targeted online, but there are some hard and fast rules that apply to anyone – no matter what type of work they are doing or searching on the internet.

● Check the Security of the Site: Secure sites begin with https:// (unsecure sites lack the “s”). Especially when submitting your credit card information or any other personal data, make sure that you trust the website who you are handing over your personal information.
● Don’t Click Links in Emails: Even if the source was sent to you by a trusted friend or colleague, their account could have been hacked. If you are sent links to another website, don’t click those links directly. Instead, type in the website on your own and go directly to the webpage through a search engine.
● Only Review Reputable Sources: Keep a list of reputable online sources where you search for industry-related content. Websites that are backed by well-known organizations such as The New York Times or Bank of America are reputable. Jared’s blog about his experience as a stockbroker investor… maybe not. That’s not to say Jared’s blog might not be a harmless and helpful source, but you may have to do a little more research before clicking through and within his website.

At the end of the day, it takes not just one person, but your entire time to limit the risk of cybersecurity threats. However, education and strategic implementation is the starting block for which to successfully begin this path. When you set your team up for success by giving them the tools they need to not only protect their business assets but their personal assets as well, you are not just securing your business’ overall success, but you are building lifelong trust with each of your employees.

How can CMIT Solutions of Stamford help your team rollout a strategic cyber-security plan? Contact us today!


We can help. Whatever your technology problem is, chances are, we've seen it before.