The Hidden Costs of Your Next Data Breach

Cost of Data Breach

Cost of Data Breach

Ask any small or medium-sized business owner and they’ll tell you the same thing: They’re terrified of a data breach. Sure, their fears might not exist on the same plane as, say, a Target or a Wells Fargo, but that doesn’t mean they’re not real and quantifiable.

The average numbers are pretty scary, in fact. According to MarketWatch, citing a study by IBM Security and Ponemon Institute, “the 2018 Cost of a Data Breach Study found that the average cost of a data breach globally is $3.86 million, a 6.4 percent increase from the 2017 report.”

That’s just the average, mind you. Things get much more frightening on a large scale: “the study also calculated the costs associated with ‘mega breaches’ ranging from 1 million to 50 million records lost, projecting that these breaches cost companies between $40 million and $350 million respectively.”

These numbers become even more heart-stopping when you consider that a data breach’s costs don’t end at the financial. There are some hidden costs of data breaches that you may not yet have considered. While no one likes to conjure more bogeymen than necessary (isn’t the world scary enough?), it’s critical to take data breach extremely seriously.

Here are seven of the most notable – and the most frightening – hidden costs of data breaches.

1. Loss of Intellectual Property

One of the most significant losses associated with a data breach is intellectual property. This can include:

  • Blueprints for setting up a factory
  • Specs for a project
  • Code for a piece of software or another product
  • Proposals for new products or services
  • Recipes for proprietary dishes or ingredients (think “secret sauce”)
  • The means of replicating patented products

If an attacker gets their hands on this information, you might suddenly have a competition where before you owned a niche. This is bound to decrease your profits and impinge upon your success.

2. Disruption of Operations

Data breaches cause a lot of panic and havoc, and unfortunately, this means suspending normal daily activities in favor of dealing with the crisis. This can put your standard timelines behind by days, weeks or even months … which is time and money you can’t get back.

3. Destruction of Property

We tend to think of data breaches as a one-way flow of information out of the formerly secure system. This includes client or customer information, intellectual property, company figures and documents, or other pieces of information customarily kept private.

However, some data breaches also include an element of cyber attack, information flowing in that is harmful to the system. Perhaps the attacker sends through the malicious code to damage it. They may also attempt to shut it down while withdrawing the data, with the intent of making it more difficult for the company to protect itself. In some cases, these attacks leave long-term damage behind, and it takes thousands or millions of dollars to pick up the pieces.

4. Loss of Customer Relationships

For obvious reasons, your customers aren’t going to be thrilled to learn that their credit card information, medical records or private purchase histories are now out in the world. While some may forgive you, especially if you take the right steps to fix the problem as soon as possible, others will not. The loss of their business can majorly cut into your margins.

You may even face canceled contracts. Money that was already factored into your budget on a monthly or yearly basis is now gone, and it will take time to replace it through new clients and customers.

5. Disrupted Vendor Relationships

It’s not just customers you have to worry about. Most people don’t want their names associated with an accident or leak that gets their end users in trouble. B2B companies still worry about what consumers will think, especially when they’re products are used as-is and branded. They may pull out as well, forcing you to find new vendors for your goods.

6. Disappearance of Important Information

Client and customer information is precious to your company. Not only do good records allow you to keep serving your important people well, but they also form a valuable basis for your business in the future. In addition to creating acrimony between yourself and your clients, losing that information can cost you considerably.

For instance, consider a breach of your customer relationship management (CRM) software. You keep a lot of valuable information inside that system, such as:

  • Customer details, including their personal information
  • Records of past interactions with clients or customers, such as medical history or purchases
  • Contacts made with the customer
  • The nature of contact made, such as phone or email
  • Financial information
  • Personal notes regarding the relationship you’ve forged with each client or customer

… and additional information that helps you to relate to your VIPs day in and day out. Starting from scratch does more than failing to impress them; it can ruin all the hard work you’ve put in so far.

7. Increased Cost of Loans

Data breaches, despite your best intentions, send the signal that your company can’t be trusted. Usually, we assume that it’s consumers whose good opinion we’ll lose, but banks and other lending companies also tend to become a little cold.

Post-data breach, it’s very likely that your company’s credit score will drop. The results of this vary:

  • You might have a harder time getting loans or extending lines of credit
  • You may have to pay higher interest rates when you do get loans
  • You might not be able to get loans at all

Any of the above may hamper your growth and limit your ability to produce new revenue, which can cost just as much in the end as losing money you’ve already made.

Bottom line? You can’t take data breach seriously enough, so if you haven’t yet done a risk assessment and put a security plan in place, make that a top priority right away. Otherwise, you’re a sitting duck just inviting breach and attack, and that’s no way to run a business.

How Can Managed Services Benefit Local Businesses?

Managed Services Provider

Managed Services Provider

Using Managed Services is really about smartly growing your local business, especially if that business relies on technology to any degree. A Managed Service Provider (MSP) is a third-party contractor that partners with your company to do exactly what its name suggests: It manages a service or services for you, usually in the area of IT. Most MSPs provide services for a fixed monthly amount, so there are no budgetary surprises involved.

Options Provided by Managed Services

As the MSP sector has grown and improved over the years, the choices available for local businesses have increased as well. Your company may need an MSP for only a single purpose — such as tech support for a shared wireless printer — or for a host of reasons. You will likely be able to find a Managed Services Provider that will offer a customized and affordable plan to meet your business needs. Here are a few of the options available.

  • Data storage
  • Onsite or offsite tech support
  • Backup & recovery services
  • VoIP phone services
  • Remote monitoring
  • Compliance services
  • Risk assessments
  • Monthly reports
  • Secure data centers
  • Private and/or public cloud services
  • And much more

Advantages of MSPs for Local Businesses

Outsourcing IT tasks to a Managed Services Provider can give local businesses access to state-of-the-art services without a significant investment of capital. A company with an upward trajectory may not be ready to hire its own full-time IT staff to manage these tasks. Most small business owners can imagine the potential headaches that are created by hiring a lone IT staffer; when that person gets sick or quits, it can be crippling in the short-term. With that in mind, here are some of the significant advantages that an MSP can offer a local business:

  • Improved Productivity: MSPs can improve productivity on both the technology side of your business and the human resources side. An MSP will reduce the overall expenses for a company, by avoiding the need for a full-time IT staff. Most MSPs also specialize in keeping technology upgraded when and where it needs to be done. For example, server upgrades may need to happen when data storage needs for your business increase. One of an MSP’s duties might be to monitor that situation and ensure the upgrade occurs before that point in time arrives, negating the need for downtime.
  • Freeing up Internal Resources: Many IT tasks are routine, mundane events — but they are vitally necessary for a business. These tasks can be morale-killers for full-time staffers who want to be working on the latest new project for the company. While these routine tasks are necessary, they are likely not the optimal way for your best employees to spend their time. Having an MSP carry out everyday tasks makes excellent sense from this perspective.
  • Improved Communication and Collaboration: Managed Services can provide the infrastructure needed for your employees to collaborate and communicate better. Downtime on projects can be reduced, for example, by having an MSP provide private cloud services combined with VoIP business phone services for your employees or even clients. Improved communications services can lead to faster production times and better product management.
  • Reduced IT Budget: This is one of the most significant advantages for local businesses when it comes to using a Managed Services Provider. As just one example, imagine the costs of maintaining your own on-site servers for business. This requires a full-time staffer to monitor and manage the servers; the servers take up physical space within your property, and it will even cause a significant bump in the monthly electric bill for your office. Utilizing an MSP makes excellent business sense because it frees up budgetary expenses that can be effectively managed for a fraction of the cost.
  • Added Stability and Scalability: You don’t have to worry about staffing turnover when you sign a contract with an MSP to handle IT services. An MSP lets you know that your business’ IT services are stable and continuous. Likewise, when your business is ready to scale up, you have two options: Have the business pay for added equipment, upgrades, staffing and more, or hire an MSP to do it for far less money. An MSP can allow you to dramatically reduce costs at the right time when you’re ready to expand.
  • Customized Plans: Many MSPs provide package deals that are based on the number of services required, the number of devices covered, the number of users on your network, or a combination of these factors. These are frequently offered in tiered versions so that smaller companies with fewer IT needs can still utilize the services. Many will also offer an “a la carte” pricing structure based on your individualized needs.

Utilizing a Managed Services Provider can give local business owners peace of mind by reducing costs and providing state-of-the-art services that they might not otherwise be able to afford. Most important of all, an MSP can allow you to maintain a sustainable business growth pattern without breaking the bank.

How To Add A Column From an Example In Microsoft Excel

Excel Support & Consulting

Microsoft Excel has been around for ages. However, did you know that there are a whole host of functionality features to simplify your workflow and help you save time? One of the most commonly used tools is the Add Column from Example option. Here’s what you need to know about it.

How Do You Add a Column from an Example in Microsoft Excel?

Start by selecting Query > Edit. Then select Add a Column. Choose Column from Examples and From All Columns. After a column is populated, go ahead and add sample data for the new column. Press the Ctrl + Enter keys to instruct Excel to populate the remaining fields.

When is Adding a Column from an Example in Microsoft Excel Useful?

The Add Column from Example feature is an instrumental part of Microsoft Excel’s Power Query functionality that saves users an immense amount of time. Examples of an ideal time to use this function in situations where you need a column that references another column, such as when you want to join two columns together. For example, combining city and state names together for an address.

Microsoft Excel

Is Add Column from Example a Feature for All Versions of Microsoft Excel?

Unfortunately, the Power Query feature of Microsoft Excel is a relatively new addition to the popular software program. You must have Excel 2016 or Office 360 to use it unless you install a free add-in from Microsoft to your version,

In short, the Add Column from Example feature is a practical and useful way to clean up data sets without additional time or effort.

The 2019 Guide To Securing Microsoft Office 365

Securing Microsoft Office 365

Securing Microsoft Office 365

The importance of fully securing Microsoft Office 365 cannot be overstated. Recent statistics show that a hacker attack occurs every 39 seconds. Government agencies and retail, technology and healthcare industries are among the most popular targets, but the truth is that cybercriminals are more than willing to hack into any vulnerable business to obtain valuable customer information and company data.

Thankfully, Microsoft offers an array of tips and tools to help businesses and individuals keep Microsoft Office 365 fully secure. There are also some practical steps a company can take to maintain a high level of security at all times. Following is a comprehensive overview of steps any business can take to fully secure Microsoft Office 365 in 2019.

Use Multi-Factor Authentication

Microsoft highly recommends setting up multi-factor authentication, and it’s not hard to see why as it is perhaps one of the most natural yet most effective ways to protect a Microsoft Office 365 account from hacks. With multi-factor authentication in place, employees will be required to not only type in a password but also acknowledge a text message on their phone to access the company account. Using multi-factor authentication ensures that valuable company data is not compromised if an employee uses an easy-to-guess password and/or leaves the company password written in a visible location. While it is crucial for employees to understand the importance of using strong passwords, a compromised password on its own would not enable a malicious third party to access your data as one would need an employee’s phone as well to gain entrance into the Office account.

Use Administrative Accounts with Care

An administrative account provides managers and executives with additional options, privileges and security features to keep Microsoft Office 365 safe from unauthorized access. However, it is crucial for administrative accounts to be used with care or they can cause more harm than good. Following are some steps every business should take to protect admin accounts from breaches:

  • Set up regular accounts for each admin user. Admin users should utilize their regular account for non-administrative tasks and reserve the admin account for functions that cannot be completed with a periodic report.
  • Have admin users close all unrelated browser sessions and apps before logging onto an admin account
  • Instruct admin users to record out of the admin account after each session.
  • Provide clear guidelines regarding which data can be viewed and downloaded using an administrative account.
  • Use a Cloud Access Security Broker (CASB) to monitor admin user actions. A CASB can detect high-risk activities involving sensitive data and identify unauthorized admin account access attempts.
  • Immediately shut down admin accounts for administrative users who leave the company.

Secure OneDrive

OneDrive has much to offer any business. It enables users to synchronize data across various devices as well as share files with other users. Unfortunately, OneDrive can also provide hackers with easy access to company files. It is not uncommon for employees to download files from a secure OneDrive account only to save the data on an unsecured cloud account or personal device. To prevent this scenario, companies should clearly mark files that should not be downloaded from the OneDrive account. It is also essential for the IT department to:

  • Know what data is being uploaded to and downloaded from OneDrive
  • Be aware of which users have access to information
  • Know which files or folders have shared links
  • Be able to see which devices are being used to access the company’s OneDrive account and pinpoint the geographical location of the devices in question

Protect Email Communications

Every company should use all the tools that Microsoft Office 365 provides to protect the company from email-based threats. The Office 365 Security & Compliance Center enables admin users to block certain types of file attachments that are commonly used for malware or ransomware. It also allows managers to enable Advanced Threat Protection to check email attachments for malware. This protection extends to files in OneDrive, SharePoint and Microsoft Teams, protecting employees who use cloud-based software from breaches.

Furthermore, Office 365 Security & Compliance Center can be used to create an Advanced Threat Protection plan that will stop email phishing attacks

The Office 365 admin center enables IT, professionals, to set up pop-up warnings for employees who are about to download an email attachment. The warning, which clearly states that employees should not open certain types of files from users they do not know as the files may contain malware, can prevent devastating consequences should an employee click on an attachment without thinking. This handy tool also makes it possible for companies to choose which types of files activate a pop-up warning, thus creating an efficient work environment for employees who can freely access safe files without automatically opening ones that could potentially be harmful.

The Office 365 admin center also has tools that can enable companies to disable auto-forwarding for emails. Many hackers who gain access to one company account use this account to automatically forward emails in an attempt to gain access to other user accounts. The emails can be forwarded without the compromised account user being aware of what is going on, making it impossible for him or her to put a stop to the forwarded emails. By disabling auto-forwarding, companies can limit the damage caused should a malicious third party compromise an Office 365 account.

It’s also wise to enable Office Message Encryption. The program is included with Microsoft Office 365 and can be enabled in Outlook for PC. The encrypted email message program allows users to send encrypted emails both inside and outside the organization and it works not only with Outlook but also common email platforms such as Gmail and Yahoo Mail.

Provide Employee Training

An astonishing 95% of all breaches happen due to human error. Busy employees who are unfamiliar with IT guidelines can make deadly mistakes that will cost companies millions of dollars to rectify. Alternatively, many employees who are familiar with IT security procedures may disregard them because they are time-consuming to comply with or because they do not understand the importance of these guidelines in the first place. It is imperative for every single company to provide its workers with comprehensive, ongoing security training to keep systems secure at all times.

What type of training do employees need to fully secure Microsoft Office 365? Following are some important points that should be emphasized:

  • Never use personal devices for work-related tasks. It is all too easy for company employees to merge work-related and personal matters. Important company files may be downloaded onto an unsecured personal laptop, which is then unknowingly breached. A personal smartphone containing valuable business data may be stolen, compromising the company by exposing vital data. Additionally, employees should never email company files to their own personal email account. Many employees do this to work on holidays or on the weekends; however, this move exposes company data to hackers who may be able to access a personal Gmail or Yahoo email account with a weak or easy to guess password.
  • Work devices should never be used for personal matters such as checking a personal email account or social media site. It is all too easy for employees to compromise a company’s entire network by downloading a malicious attachment from a personal email account or social media site.
  • Employees should be taught the right way to communicate with colleagues and superiors. Internal communications should be secure and follow proper protocol to prevent important data from falling into the wrong hands. Employees should also be taught how to spot fake communications ostensibly from management but actually sent by a hacker attempting to access company data.
  • Knowing how to back up important data is yet another aspect of employee security training. Data should be backed up regularly yet in a secure manner so that unauthorized third parties cannot access files as they are being copied to or from a cloud server.
  • Companies should also create a plan for handling a malware, ransomware, DDoS or any other type of cyberattack. Even the best Microsoft Office 365 security guidelines cannot guarantee that an attack will never occur. Employees should know how to recognize the signs of an attack and what to do to limit the damage.
  • New employees will need industry-specific training on how to handle important data. Healthcare companies, for example, will need to ensure that all employees are aware of current HIPAA guidelines regarding patient data privacy. Government entities will need to train employees to handle sensitive or classified information by existing laws and regulations.

Cybercriminals are always on the job, looking for new ways to access company data from Microsoft Office 365 and then misuse this data by offering it for sale on the dark web or demanding a ransom in exchange for returning company files. Given this fact, it is important for businesses to have a plan in place to keep their Microsoft Office 365 accounts secure at all times. The tips mentioned above are an ideal starting point; at the same time, companies will need to customize their approach to Office security to ensure their files remain safe from unauthorized access. It’s also wise to re-examine security guidelines from time to time to ensure that they are still are effective and efficient as they are meant to be.

What Should Be In Your 2019 Technology Strategic Plan

2019 Strategic Plan

2019 Strategic Plan

Making an Ultimate Technology Plan for the New Year

Times are changing. Apparently, this is the case considering we’re about to head into 2019. How is your current technology holding up at your company? If you feel like there are certain things that you need to change up to stay competitive, it might be time to confront this challenge head-on with an ultimate technology plan.

You may not be familiar with how to implement one, but once you learn the basics, which we are going to show you here today, it’s a smooth process that will have you on the road to an overall improvement in every aspect of your offices’ technological needs.

Let’s get started with how to create a technology plan for your company or small business so that when you head into the new year, you’ll be thoroughly prepared to be on the cutting edge tech-wise.

Step #1: Look Over Your Existing Technology

When you look around your small business or office setting, what do you see? Do you see old computers, old printers, and another dinosaur related tech that you aren’t even using anymore? Part of your plan should be to clear out old and outdated tech stuff that you probably aren’t using anymore.

Now is the time to recycle all of that and remove it for good from your workspace. It’s like a breath of fresh air when you clean out old technology this way. The beginning of the new year is the perfect time to do this. You’ll be pleasantly surprised at how much this can help to improve the overall attitude of an office or another work setting.

Step #2: Create an Ideal Budget

Mention the word budget and it always feels a little bit “heavy.” What can you afford? What can you really really afford? Sometimes what you need and what you can afford are two different things.

Create an ideal budget in mind that fits in with your revenue plan. You don’t want to overspend, but you do want to achieve your ultimate technology plan with the right budget in mind. Do the best you can with this.

It may require some research to figure out how to afford the technology items you need, but with the right focus, you should be able to obtain great technology that fits into your set budget.

Step #3: Plot Out What You Need

Figure out everything you need tech-wise and the cost for each item. Put all of it into your plan so that you can visualize having the full scope of your new tech at your disposal.

Don’t leave anything out to figure out later. Make this ultimate technology plan as detailed as possible so that you know exactly what you will end up with to ultimately suit your needs.

Step #4: Implement a Realistic Timeline (3-6 Months)

Most of the time you are going to want to get your new technology purchased over a few months. If you can afford it all at once, fantastic. If not, it’s okay to set up a realistic timeline to obtain everything you are going to need to have updated gear that works for you.

Many companies look for a timeline that extends around 3-6 months. If you need it to be shorter or longer, according to your individual company’s needs, that’s fine too. It all goes back to your budget and what you can afford to do at any one time. Or over a few months if need be. Your finance department will be able to assist you with this part of the technology plan.

Step #5: Write Your Plan Out in Detail

Your plan is known as your “technology vision statement.” Sounds pretty fancy, right? This is going to help you achieve your mission to be updated entirely going into the new year with your brand new technology in place.

You’ll be amazed at how much fresh tech will energize your team. Don’t underestimate the power of renewed vigor and the new year is the right time to have your technology planning accomplished. Set out and do it right so that you are ahead of the game in your industry.

It just makes everything you need to get done go a lot smoother for you and your team. After all the last thing you want as a cutting edge company is to look like you are lagging behind tech-wise. Your clients will pick up on your overall image and tech that isn’t up-to-date looks like an eyesore.

8 Amazing Tips To Take Awesome Photos With Your iPhone

Smartphone photo

Smartphone technology and the internet have made it possible for us to share ideas—and do business—with people all over the world. Learning to use the powerful tools we have at our fingertips more effectively is one of the most significant challenges of our time. Today’s consumers aren’t just looking for products—they are seeking mutually beneficial long-term connections. No matter what your business is, you can increase your sales by using photos to share information about your products, your company, and most importantly, yourself.

The success of Instagram and Snapchat demonstrate that photos are one of the most preferred methods of sharing information and making human connections. People want to feel personally connected to those they do business with, and social media is a great way to introduce your staff to the world. The right photos can reveal their personalities as well as showcase their talents and abilities in a way that words alone just can’t. You don’t have to be an award-winning professional photographer to create amazing photos, either. The following eight tips can help you transform your iPhone camera into the window through which the world can view your company.

How to Get to the Camera Quickly and Never Miss a Shot

The perfect shot never lasts very long. That’s why there’s more than one way to get to your iPhone camera. The fastest, easiest way is to just swipe left after waking the phone. If you are already in another screen, swipe up to get to the control center where the camera icon is located. If you don’t have a camera icon in your control center, you can add it in three easy steps by going to settings, choosing “customize controls”, then choosing “add camera”.

How to Snap a Photo

You can snap a photo by pressing the home button (aka shutter button) while in the camera app. However, trying to hold the phone still while maneuvering your hands towards a button located near the bottom of the screen can be difficult. Luckily, once you have the perfect shot lined up, you can also use either of your volume buttons located on the side of your iPhone to snap the photo. Being able to use whichever method is easiest to access can mean the difference between a good shot and a great one.

Object Placement, Composition, and Symmetry

Your iPhone camera comes equipped with a grid to help you line up your shots more accurately. The grid is also a useful tool for creating more balanced compositions because it breaks the available space into separate parts. To utilize the grid, go to camera settings, find “grid”, and enable it by swiping the radio button to the right until it turns green.

HDR—High Dynamic Range

The right lighting is often difficult to achieve, but the HDR setting on your iPhone camera can help. This setting allows to you reduce distortion of light and dark in photos taken where there are high-contrast light sources. It also helps reveal more details in both light and dark areas. HDR uses a process of shooting several frames in rapid succession, then merging them together to achieve the best effect. In camera settings, the HDR option will be near the bottom. Make sure the “Keep Normal Photo” option is switched on, so your camera will save both versions of your photo.

Automatic Focus and Exposure

Once you have the shot you want, it’s time to lock your focus. To do that, just tap and hold the focus box. When the yellow AF/AE circle slider appears, press it to lock the focus. If you want to adjust the exposure, drag the yellow exposure slider to the right side of the focus box. You will then be able to slide it upwards to increase exposure, and downwards to decrease it.

Camera Modes

Burst mode allows you to take ten photos per second, ensuring that you get just the right one. To go into burst mode, simply hold down the shutter button for a half a second or longer. Portrait mode is perfect for close-up photos that focus on human subjects and don’t require depth of field. This mode also has several special lighting effects, including studio, contour and stage lighting that you can apply either during the shot or afterwards. While the digital simulation of a shallow depth of field may not yield the professional results that a DSLR (Digital single-lens reflex) camera can, the results can still be amazing.

Lighting Effects

The studio light effect enhances highlights. The contour effect creates a dramatic shadow effect. The stage light effect darkens the background. The stage light mono setting transforms a color photo into a black and white photo. To apply any of these special lighting effects afterwards, just press the edit button.

Live Photos

The Live Photos feature. Available on iPhone 6s and newer, creates shots that are part photo and part video. Like video, it can capture both movement and audio. To activate this feature, just tap the circles icon in the camera app. You can then apply different effects to your live photo shots, such as bounce, loop, or long exposure. To access them, just swipe up while you are in Live Photo. Loop plays, then repeats the video, using a dissolve transition. Bounce plays, then reverses, the video. Long Exposure combines all the frames into one blurred image, which is great for moving water shots.

Smartphone photo

These eight tips can help you take better photos with your iPhone camera. But don’t forget that your iPhone also has a front-facing video camera. While photos can capture beautiful moments, some of the best memories your customers will have of your business are the ones you create together. The video camera is excellent for either FaceTime or Skype, both of which provide almost all the benefits of speaking in person. You’ll be able to look into one another’s eyes, see one another’s emotional reactions, and transform puzzled expressions into “Oh!” moments.

Using photos on Snapchat or Instagram, you can introduce your friendly, highly competent staff as well as new products and services. Video capability provides a way to show your customers not just your finished products, but the processes that created them. Affordable prices, quality products, and superior customer service are all important elements of any successful business. However, all other things being equal, the ability to make and maintain genuine human connections is the one element that can guarantee not just short-term profits, but future returns.

Will Cybercriminals Shutter Your Business In 2019?

Cybersecurity

Cybersecurity

If the frightening headlines about massive data breaches were not warning enough, upwards of 60 percent of all small and mid-sized businesses, reportedly shutter within six months of a systems hack.

The leading causes of nefarious systems incursions are reportedly caused by about 25 percent of valued employees repeating the same username and password across multiple platforms. But what remains even worse is that fact that as many as 95 percent of all small businesses lack adequate protocols to safeguard important company or customer information.

In the coming months and years, cyber threats are expected to continue to pose a grave danger to the health and well-being of small and mid-sized organizations. The question business leaders may want to ask themselves is . . . will you join the 60 percent of companies that did not recover from a data breach?

Strengthen Your Business Defenses

Many of the toppled 60 percent may wish they knew then what many know now. That is, the key to cybersecurity does not solely depend on having the best software protections. According to the National Cybersecurity and Communications Integration Center, and Department of Homeland Security, nefarious email remains a primary trap used by cybercriminals and DHS recommends the following safety procedures.

“Never click on links in emails. If you do think the email is legitimate, whether from a third party retailer or primary retailer, go to the site and log on directly. Whatever notification or service offering was referenced in the email, if valid, will be available via regular log on.”

“Never open the attachments. Typically, retailers will not send emails with attachments. If there is any doubt, contact the retailer directly and ask whether the email with the attachment was sent from them.”

“Do not give out personal information over the phone or in an email unless completely sure. Social engineering is a process of deceiving individuals into providing personal information to seemingly trusted agents who turn out to be malicious actors. If contacted over the phone by someone claiming to be a retailer or collection agency, do not give out your personal information. Ask them to provide you with their name and a call-back number. Just because they may have some of your information does not mean they are legitimate.”

As you can surmise, these cyber safety measures do not necessarily rely on the latest antivirus software or systems protections. Hackers continue to take advantage of human oversight and error to infiltrate organizations and pirate valuable personal data and intellectual property. Homeland Security also recommends that business leaders implement the following employee training and protocols to protect against data breaches via email.

  • Maintain Secure Passwords: Change passwords regularly and never share them or provide co-workers with access.
  • Verify Sources: Make certain that emails originate from people and companies within your network by contacting them directly for verification.
  • Nix Auto-Download: Never use automatic download options for email attachments.
  • Never Click On Links: Embedded links are a primary method used by hackers to trip up team members through ransomware and malicious viruses.

Strengthening a company’s defenses begins with employee training and awareness that data breaches are not reserved for significant organizations and Fortune 500 corporations. Hackers continue to troll for low hanging fruit and unsuspecting employees who make innocent mistakes.

Employee Cyber Security Training is Job One

Although ransomware attacks reportedly declined from 638 million in 2016 to 184 million in 2017, according to Statista, this method has been used to target a tremendous number of small and mid-sized outfits.

The common attitude among cybercriminals is that decision-makers will ultimately weigh the cost of paying the ransom against potential profit losses and do the math. Hackers understand that poorly defended organizations are likely to negotiate and pay up. That’s why valued employees must remain vigilant and be a sort of human firewall if you will.

Proactive industry leaders are tasked with training employees and also determining which team members could be considered at risk. An IT support team can utilize training videos, create a cybersecurity policy and implement it by working with groups and individuals. But once the hands-on work has been completed, it’s imperative that companies conduct ongoing cybersecurity evaluations. These are logical methods to consider.

  • Identify team members who could be best targeted by hackers.
  • Deploy unscheduled mock cyber attacks.
  • Create and release convincing but harmless mock ransomware links via email.
  • Require employees to complete cybersecurity training modules.
  • Require advanced training for those who are tripped up by mock cyber attack drills.

We may be living in a golden age of technology, but our everyday fallibility remains the threshold that cybercriminals use to break into our business systems and rob our valued customers and us of critical data. One of the primary ways to avoid joining the 60 percent who are out of business is to make team members aware of cyber dangers and provide them with the skills to combat cybercriminals.

Here’s How Cybercriminals Con Businesses In 2019

Cybercriminals

Cybercriminals

Is someone out there pretending to represent your business to make money? Don’t laugh. It happens. Business identity theft is a growing concern for many companies across the US. According to a recent study by Dun & Bradstreet, business identity theft, also called commercial or corporate identity theft, was up 46 percent in 2017.

The CEO, Mary Ellen Seale, of The National Cybersecurity Society (NCSS) said, “Small business identity theft – stealing a business’s identity to commit fraud, is big business for identity thieves.” However, too few businesses, especially smaller businesses, are aware of the issue. In 2018, the NCSS published “Business Identity Theft in the US” to help publicize the problem, and to provide guidance on how companies can help protect themselves.

Which Types of Businesses Are Targeted by Business Identity Theft?

Corporate identity theft is not just a problem for large corporations or companies operating in a particular industry. It is a crime which can affect any-sized business from tiny Mom and Pop shops on Main St. USA to multinational companies who are involved in any commerce:

  • Small companies are usually the initial victims of identity theft since these companies tend to have more lax security in place and are less likely to realize their information is at risk. However, that doesn’t mean that larger companies are immune from having a criminal steal their identity. Plenty of larger businesses have their identities stolen each year.
  • Corporate identity thieves use the name and legitimate business information of customers of large vendors’ customers to trick them into fulfilling orders. Busy vendors who fail to put into place procedures to verify whether an order is genuine can end up losing millions of dollars a year to these scams.
  • Criminals masquerading as a legitimate business deceive financial institutions to open credit card accounts, establish lines of credit, send or receive wire transfers, and secure loans.
  • The list of victims of corporate identity theft even extends to the US government when criminals use stolen company credentials to claim tax refundable tax credits or to exploit other government benefits for corporations.

How Do Thieves Steal a Corporation’s Identity?

Criminals who steal the identities of businesses have a wide range of methods ranging from very simplistic to highly sophisticated. Many lower level identity thieves focus on email phishing scams which target employees of the company in an attempt to gain confidential information such as database passwords or HR records. Other simple scams use spoofed email accounts of company executives to trick vendors and clients of a company into believing they are communicating with someone from the company. Slightly more advanced scams can include setting up an unsecured WiFi network in near a company in hopes that employees will use it to conduct business and then stealing the data.

More sophisticated scams can include dozens of people, building fake websites, using shelf companies, social engineering and even renting office space at the same location as the targeted company. The goal of these higher level scams is typically to create a plausible “Proof of Right” which the thieves can then use to secure fraudulent loans, masquerade as the company in a business deal, or even sell company assets.

How Can You Protect Your Company From Identity Theft?

While there is no way to protect your company completely from identity theft, you can make it harder for cybercriminals by maintaining proper data protection procedures.

  • Train your staff. Teach your staff how to recognize phishing scams and how to verify when an email is from a legitimate source. Establish procedures on how to handle data correctly, and have a data loss prevention plan in place including a ‘clean desk’ policy.
  • Secure your network. Add additional security to your networks and ensure that everyone is using secured servers. Avoid using a ‘master account’ which allows access to your entire network to limit data breaches. Require two-factor authentication.
  • Monitor your financial information. Check your company’s credit report regularly to ensure that there aren’t any unexpected changes such as credit applications or new accounts.
  • Consider hiring a company to help prevent corporate identity theft. An outside security company is one of the best ways to protect your corporate identity from scammers.

Terminating Your Internal IT Tech: 6 Things You Need To Know

Terminating an IT Guy

Terminating an IT Guy

No one wants to go through the stress of firing anyone, but sometimes you need to let one of your IT techs go. This can leave your company wide open for data breaches. Before starting the off-boarding process of an employee who has access to your entire computer network, having a proper procedure in place can help protect your data. Use these six tips to create a process you can use to safeguard your company’s private information when severing ties with a member of your IT team.

Tips to Terminate an IT Employee Without Risking Your Company’s Information Security

Eliminate the employee’s company network access. It is perhaps obvious fired employees should no longer have access to company computers, but a recent study found that surprisingly almost 9 out of 10 former employees’ credentials were still active for some time following termination. Your business can prevent potential issues by disabling, but not deleting a person’s business account and passwords before firing. You should pay particular attention to blocking any applications which allowed the employee to access your company data remotely.

Prevent access to third-party applications. Access to third-party software connected with your company can be more difficult to contain than access to in-house computer systems. If your former IT employee had access to third-party applications such as Dropbox, Outlook, Sharepoint, Trello, or Facebook, remove the person’s access immediately. This is where the importance of good record keeping is beneficial. Remember to leave your former employee’s email accounts and cell phone number open for a time, but forward emails and incoming calls to another member of your staff to maintain seamless communication.

Recover company-owned property. Before the former employee leaves your premise, take back the person’s company ID, access cards, keys, fobs, cell phones, laptop computers, and any manuals. Your HR department should always maintain a list of anything you give your employees to make it as easy as possible to verify the person returns everything.

Back up the former employee’s work computer. In the rare event that a former employee misuses your company’s data, it is essential for you to have a record of everything the person had access to while employed. Before reformatting the terminated employee’s computer or company cell phone, make a complete backup of the data and maintain the information for a few years just in case the worst-case scenario occurs.

Inform people that the person no longer works for your company. Make sure that all of your employees know that the person left the company and that their former coworker should not be in the office at any time. Ask your employees not to discuss company information with the person in the future. Contact any vendors which the former employee did business with and give them a heads up in case the person tries to contact your vendors for any reason.

Change access codes and locks for your most sensitive areas. If the terminated employee was able to access highly restricted areas in your company, replace locks and create new PINs and door codes. Look into the possibility of upgrading your security to use biometric or individual passcodes to make the process as easy as possible.

In a survey by Osterman Research, Inc., over 75 percent of former employees who retained credentials admitted to at least logging into company computers. Hopefully, your former employee is the rare exception, but the risk is far too significant to do nothing.

2019 Best Practices For Keeping Your Password Secure

Best Practices Password Security 2019

Best Practices Password Security 2019

Every account you have is protected by a password or a PIN of some kind. A PIN is a personal identification number that is unique to the account it is attached to. In some cases, you are allowed to choose your own PIN. For other accounts, you must use the PIN or password that is provided by the creator of the account. Memorizing PINs and passwords is essential if you want to maintain your privacy and keep your accounts fully protected. It’s also vital that you use a few “best practices” when it comes to managing your passwords.

Avoid the Obvious

Avoid using the most obvious choices like your children’s names or notable dates. Choose passwords that would be difficult to trace back to someone or something that is important to you. Choose random numbers and words that can be easily remembered. Hackers who break into accounts will often look through your information to try and find patterns. Random words and phrases are less likely to be picked up within the pattern.

Two-Factor Authentication

Two-factor authentication can involve the use of a PIN and a password, or a PIN/password and a series of security questions. It can also include the use of a security key ( a card that is coded with personal information) and a PIN. The only way to access the account is to have both pieces of the puzzle to unlock the code. If one of the pieces is wrong, you may be locked out of your account until a system reset can be performed.

Separate Numbers and Symbols

Numbers and symbols that are used together may indicate a date or account number. Separate your numbers and symbols to remove any type of familiar sequencing. Alternate numbers, letters, and symbols so that it is difficult to identify any type of common pattern or series.

Use Your Fingerprint to Secure Mobile Devices

One of the best ways to protect your information is through the use of your fingerprint. iPhones can now identify your eye by scanning your cornea. Both of these methods use body parts that are unique to you. No one can duplicate them or alter them in any way. By using a fingerprint or eye-scan to protect your mobile devices, the information stored on that device is protected. You should still, however, change your passwords frequently.

Don’t Use the Same Password for Multiple Accounts

Avoid using the same password for multiple accounts. Choose a new and unique password for each account you have. While it may be difficult to remember multiple passwords, the alternative could mean devastating financial losses. Choose several password and PIN options that can be used effectively. In some cases, you may be able to rotate them. This must be done randomly and without a pattern to maintain the highest level of security possible.

There are ways to protect your passwords and PINs so that you can maintain your accounts and keep them secure. Using a password manager is just one way to secure your accounts. Determine which type of measures work best for you and use them effectively so that all of your information remains protected from outside predators and hackers.