IT Lessons Learned From Recent Cloud Hacking Events
Recent Cloud Hacking Events Lessons Learned
In recent months, there has been a lot of coverage for cloud hacking events. Everything from retailers to celebrity cell phones have been hacked–posing the question–how do I prevent my sensitive information from being stolen?
In some cases, such as shopping at retailers, there is little you can do unless you’d rather deal exclusively in cash (and even then, ATM machines are not immune from being hacked to steal your account information). In many instances though, there are several things you can do to minimize your risk of being hacked.
1) Create Strong Passwords
This one may seem obviously, but you would be surprised how few people have strong passwords on their devices and for their most important accounts. As a business professional, you want to make sure your employee accounts and devices are as secure as possible.
You should create and provide a formal password policy to all employees to ensure they are creating strong passwords.
2) Provide Training
Simple, regular training sessions with your employee about recent phishing scams and common security threats can significantly reduce your risk as a business owner. Scam artists are becoming increasingly savvy in their ability to create email phishing scams that look like emails from legitimate companies, so it is important that your employees know how to recognize these.
3) Be Careful with BYOD Policies
Bring Your Own Device (BYOD) policies are becoming increasingly common–and they can be a tremendous plus in the workplace–but you need to have a good system put in place before implementing such a policy. BYOD policies increase mobility, employee happiness, and productivity. Despite the benefits, they bring risks of loss or theft of sensitive data as well as malicious malware getting onto internal systems.
The risks can be mitigated, however, by disallowing the downloading of apps from third party stores on corporate devices and by making it a requirement for employees to adopt enterprise policies for their own devices before being allowed to access company networks.
4) Know Your Data
With data storage everywhere and easily available, this brings the risk of data being stored in a number of different places–from internal services to cloud storage networks to hardware devices themselves, your data is everywhere.
To protect sensitive data, you first have to know where your data is being stored, how it flows through your business, and how it is accessed. This will help you craft a comprehensive security strategy to protect your data across your network and devices.
Network Security Consulting by Solvere One
Solvere One offers the right combination of managed network security technologies with flat fee pricing to businesses and organizations in the Washington, DC, Northern Virginia and Maryland metro area that will protect all of your information and communication from inside and outside threats. The right combination involves our expertise of having implemented the many different network security, detection and monitoring solutions that are available. Layering these tools within a sound infrastructure will prove critical in continuing to provide protection should one of the layers of tools fail.
Our managed network security solutions will afford any business the confidence that their data and web sites are secure. Some of these technologies we use are the very same used by the United States Congress, as well as other government entities and private clients.
Protect Your Network with Solvere One
Please follow and like us:
- Free network security review
- Managed security services
- Disaster recovery and prevention services
- Wireless business network security