You may be under the impression that emails are relatively secure. You have been schooled on phishing and know not to open any suspicious PDFs or click on fake URLs. But that aside, your internal and external emails are still vulnerable to interception by hackers that are listening or sniffing on your network.
Confidential information can include business plans, documents, designs, sketches, source code, trade secrets and medical/financial records.
The inherent risks with email are twofold:
Follow these dos and don’ts and your organization will be on the path toward successfully stopping these hacks that can lead to costly or embarrassing leakage of confidential information.
Not sure how to tell the difference? First and foremost, the web address starts with https, with the “s” standing for secure. Also, look for a lock or the word “secure” next to the URL address.
You can send the portal information to log-in if you’d like, but send a text, call or stop by someone’s desk and give them the log-in credentials.
Let them know the email is coming by calling or texting them.
Be sure to keep your operating system, software and anti-virus software up-to-date. This is one of the better ways to keep hackers at bay. If your computer does become compromised, be sure to immediately shut it down and alert the IT staff you have a problem.
If you are in the healthcare field, you need to comply with HIPPA. In the government, GSA standards. In the financial world, it is the Financial Industry Regularity Authority.
From email vulnerability consulting to total network assessment and everything in between, we are here to help small to mid-sized businesses with their cybersecurity practices. Please give us a call today at 516-876-8200 to set up your assessment appointment.
The ProActive Technology Group
14 Plaza Rd
Greenvale, NY 11548
516.876.8200
info@ptg.co