Cybercrime has skyrocketed and is projected to get much worse.
Whether it’s ransomware, data from stolen laptops, server breaches or improper paper document disposal, cybercrime is costing several trillion dollars in the aggregate.
At risk is the health of your company as well as the welfare of anyone with whom you do business. Even if you’ve thought you’ve financially survived a cyber attack, you risk a tarnished reputation.
So for solutions, it’s worth the financial investment in your technology and systems.
To protect your customers’ data, here are 15 strategies:
1. Own your own dedicated server
True, cash is king but using a shared server to save money isn’t worth the risk. A shared server means a higher exposure to cyber risk.
Other sites on your server might have weak security. Employees, customers and vendors of other companies pose with access to your server pose too big a risk from cyber criminals.
2. Implement a policy to limit access to personal information
Limit all access to sensitive customer information to only key employees.
If you or any key employees travel or telecommute, make certain the computers have virtual private network or secure VPN access.
When such employees leave your company, revoke their access to all accounts.
3. Encrypt your data
If you store or send data via an unencrypted channel you’re practically asking for trouble.
4. Use a sophisticated malware protection service
You need to have a service that will monitor and protect your site and visitors from compromise or malicious-code infections.
5. Shred sensitive documents
Companies that have consumer and employee data are required to dispose of it according to the Federal Trade Commission.
6. Get wiping software
The same disposal rule for paper documents is applicable to digital data – CDs, DVDs, floppy disks and hard drives.
7. Get computer-screen facial-recognition software
The main feature of facial-recognition software is that it provides display protection. So it’s another layer of protection from nosy people.
The computer screen blurs when the computer user looks away. Onlookers can’t see what’s on the screen.
8. Have a breach-disaster plan
In the event of a breach, you’ll want to have a disaster plan in place. This, of course, includes identifying and isolating the issue, notifying your customers and other stakeholders, and having your IT person solve the problem.
At risk is the health of your company as well as the welfare of anyone with whom you do business. Even if you’ve thought you’ve financially survived a cyber attack, you risk a tarnished reputation.
You need to minimize customer apprehensions, and mitigate potential damage to your finances and reputation.
9. Keep software updated
Viruses and hackers look for vulnerabilities in your software. So don’t ignore the messages letting you know it’s time to update your software.
10. Use software to manage your customer relationships
Customer relationship management (CRM) tools enable you to keep all your customer information in one location. CRM makes for better control and security.
While you’re at it, determine which employees can get certain types of information and which persons can make changes.
11. Don’t use the same password over and over
Passwords are regularly hacked. They need to be sufficiently strong to avoid danger. Some password tools will create strong passwords for you.
For convenience, there are tools that house your passwords.
12.Stop doing-it-yourself accounting
If you’re not using affordable accounting software, you’re not managing your time well and you’re risking data breaches. That’s especially true if multiple employees on different computers are using Excel spreadsheets.
13. Have an IT expert on your team or on call
You should have someone responsible to guarantee your computers and software are updated.
Scroll down to the Coach’s Corner for links to articles to either hire the right tech professional or the best tech consultant.
14. Train your employees on digital security
Never assume your employees are up-to-date on computer use and security. Periodically train them in best practices – from password usage – to not downloading unapproved files that might threaten your customers’ data.
That includes social media.
Yes, an epidemic of social-networking attacks represents unprecedented dangers to companies. After a Facebook user cost her company a $1 million loss, I wrote the article, 5 Safety Measures to Thwart Mounting Social-Network Attacks.
15. Stay current in your reading
Perhaps the most-trusted security source is https://www.SecureTheVillage.org.
From the Coach’s Corner, related strategies:
9 Tips to Train Employees to Protect You from Cyber Crime — It takes a team approach to protect your organization against the skyrocketing rate of cyber crime. Here are nine training precautions necessary to make sure your employees help you guard against security threats.
Key Measures to Prevent, Recover from Ransomware — Published reports indicate ransomware costs businesses millions. The FBI considers ransomware attacks one of the three worst cyber threats.
How to Enhance Security in Your Company’s Wireless Network – Do you take it for granted that your wireless network is secure? Don’t make that assumption. Wireless routers present dangers. Your router is vulnerable to hackers and, hence, security issues. If you’re really serious about security, WIFI might not be for you.
Recruiting an IT Professional for Your Small Firm? 6 Tips for the Right Skills – Are you looking to add information technology personnel? You want to hire for a competitive edge, right? IT is a crucial position for you. The difference between failure and success requires reflection to hire for the right competencies.
6 Tips to Save Time and Money by Hiring the Right Tech Consultant — If you need to hire an information technology consultant, it can be costly in time and money, if you choose the wrong person. Use due diligence. Sophisticated tech vendors and consultants of all sizes have been known for cost over-runs.
Tips to Avoid Advertising Scams Tricking You to Ask for Tech Support — Advertising scams that prey on Internet consumers have prompted four Internet companies to band together to fight the abuse. The scams use harmless-looking ads to trick consumers into using phony tech support that actually enable cybercriminals to invade the unsuspecting owners’ devices.
“The balance between freedom and security is a delicate one.”
-Mark Udall
__________