Women's Independent Press

Informing women about our world!

  • Business Directory
  • About
  • Events
  • Blog
  • FindHer, A Women’s History Scavenger Hunt-8/25/18
  • Find Her- WOMEN’S HISTORY SCAVENGER HUNT Featured Women 2017
  • Ad Rates-2019/20 –Want to find a woman owned business in your community? We’ll help you find what your what your GPS won’t tell you
  • December 9, 2023
You are here: Home / Feature Article / Top 10 Cyber security Tips

Top 10 Cyber security Tips

May 30, 2016 by admin Leave a Comment

https://www.sba.gov/…/sba…/cybersecuritycomputer
 Protect against viruses, spyware, and other malicious code
Make sure each of your business’s computers are equipped with antivirus software and antispyware and update regularly. Such software is readily available online from a variety of vendors. All software vendors regularly provide patches and updates to their products to correct security problems and improve functionality. Configure all software to install updates automatically.
 Secure your networks
Safeguard your Internet connection by using a firewall and encrypting information. If you have a Wi-Fi network, make sure it is secure and hidden. To hide your Wi-Fi network, set up your wireless access point or router so it does not broadcast the network name, known as the Service Set Identifier (SSID). Password protect access to the router.
 Establish security practices and policies to protect sensitive information
Establish policies on how employees should handle and protect personally identifiable information and other sensitive data. Clearly outline the consequences of violating your business’s cybersecurity policies.

 Educate employees about cyberthreats and hold them accountable
Educate your employees about online threats and how to protect your business’s data, including safe use of social networking sites. Depending on the nature of your business, employees might be introducing competitors to sensitive details about your firm’s internal business. Employees should be informed about how to post online in a way that does not reveal any trade secrets to the public or competing businesses. Hold employees accountable to the business’s Internet security policies and procedures.

 Require employees to use strong passwords and to change them often
Consider implementing multifactor authentication that requires additional information beyond a password to gain entry. Check with your vendors that handle sensitive data, especially financial institutions, to see if they offer multifactor authentication for your account.

 Employ best practices on payment cards
Work with your banks or card processors to ensure the most trusted and validated tools and anti-fraud services are being used. You may also have additional security obligations related to agreements with your bank or processor. Isolate payment systems from other, less secure programs and do not use the same computer to process payments and surf the Internet.
Are you ready for the shift from magnetic-strip payment cards to safer, more secure chip card technology, also known as “EMV”? October 1st is the deadline set by major U.S. credit card issuers to be in compliance. Visit SBA.gov/EMV for more information and resources.

 Make backup copies of important business data and information
Regularly backup the data on all computers. Critical data includes word processing documents, electronic spreadsheets, databases, financial files, human resources files, and accounts receivable/payable files. Backup data automatically if possible, or at least weekly, and store the copies either offsite or on the cloud.

 Control physical access to computers and network components
Prevent access or use of business computers by unauthorized individuals. Laptops can be particularly easy targets for theft or can be lost, so lock them up when unattended. Make sure a separate user account is created for each employee and require strong passwords. Administrative privileges should only be given to trusted IT staff and key personnel.

 Create a mobile device action plan
Mobile devices can create significant security and management challenges, especially if they hold confidential information or can access the corporate network. Require users to password protect their devices, encrypt their data, and install security apps to prevent criminals from stealing information while the phone is on public networks. Be sure to set reporting procedures for lost or stolen equipment.

Protect all pages on your public-facing websites, not just the checkout and sign-up pages

Filed Under: Feature Article

Sign up for the newsletter

Sponsors

PNC bank Volunteers of America

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Women’s Yellow Pages of Greater Pittsburgh

Women’s Yellow Pages of Greater Pittsburgh
FacebookTwitter

Recent Posts

  • Earth Day 2021
  • Chex
  • Can every moment be defined as special?
  • Do you Know? Anne Pride

Get Your Ad Listed!

Get your advertisement in the next edition today!

Recent Posts

  • Earth Day 2021
  • Chex
  • Can every moment be defined as special?
  • Do you Know? Anne Pride
  • Networking
  • Look Beneath the Surface

Tags

Craft Shows domestic violence emotional abuse Flea Market intimate partner violence partne violence physical abuse SBA sexual abuse small business taxes tax ID verbal abuse

Copyright ©2023 · Women's Independent Press - All Rights Reserved · Website by Fort Pitt Web Shop