IT PROTECTORATE
  • Home
  • Services
    • COVID-19 Remote Work
    • IT Support
    • HVAC IT Services
    • Industrial IT Services
  • About
    • Why Us?
    • Technology Platform
  • Contact
  • IT Pro Blog
    • Florida Hurricanes
    • IT Maturity Index
  • CyberSecurity Report Card
  • Support Center

Did You Lock the Door?

10/19/2019

 
LOCK YOUR DOOR.
LOCK YOUR COMPUTER.
LOCK YOUR ACCOUNTS WITH SECURE PASSWORDS.

Locking the door to our homes when we leave is something most do on autopilot. If you drive to work, you automatically lock your vehicle after arriving to your destination (I listen for the beep, and sometimes have to walk back to the car at my wife's disgust to hit that lock button one last time). Checking the physical locks in our life is easy, we don’t even think twice. But what about the digital locks, did you lock them too? Does it matter? Most definitely.

Trust me, you are not alone in the never ending frustration of trying to remember your latest passwords. Even those of us who spend our careers in the IT industry can get a bit tired of it. Which is why many people (even though they know better) often use weak passwords. We have all been guilty at one time or another. But, here is the thing: the small inconvenience of selecting secure passwords and updating them frequently is much easier to handle than a data breach. In a sobering reality check, the 2017 Verizon Data Breach Investigations Report found that 81 percent of data breaches were caused by a password hack.
Think of your passwords like a flood wall made up of sandbags. In one section the sandbags are eight feet tall and four feet deep. Yet, in another section, the wall is only five feet tall and two feet deep. Now, picture flood waters pushing with millions of pounds of pressure on the wall. Maybe the taller and thicker section holds, but then the waters find a weakness in the shorter and more narrow section. Within minutes, the sandbags are pushed aside by the raging waters and the whole neighborhood is buried in damaging flood waters. Like the weaker section of the flood wall, in your organization if even one member of your staff uses a weak password, it exposes the entire business to the risk of a data breach.
This month is National Cybersecurity Awareness Month (NCSAM), at IT Protectorate we encourage you to use this month as an opportunity to remind your team of the importance of selecting strong passwords and updating them frequently. #SecureIT and keep your company’s data safe.

TIPS FOR CREATING A STRONG PASSWORD
  • Avoid common passwords. Do not use "password," "qwerty," "111111," "12345678," "abc123," "password1," or any other easily guessed words/phrases for your password.
  • Use different character types. Most systems and applications these days require or encourage using upper and lowercase characters, numbers and symbols to create a strong password. Even if your systems don’t (we can help enhance your security settings), it is still a best practice to select a password that follows these guidelines.
  • Keep it unique. What happens if one app you use personally gets hacked and you used that same password on other systems, including your work accounts? I’ll give you a hint, it’s not good. Be sure to use a different password for each site and application that you use. You can record the passwords in a physical notepad if needed to remember them, but be sure to store the notepad securely and away from your computer. Seriously, if you write it down somewhere—lock it up in a safe and don’t make it obvious what the passwords are for. If someone were to find your notepad, at least send them on a fishing expedition!
  • Don’t make it personal. Include things like your name, birthday, child's name or other personal information in a password makes it that much easier to get hacked. These are all things hackers can find without much difficulty. Instead opt for unique words and characters that appear to be completely random.
Selecting a strong password is an important piece of your data security shield. In addition, utilizing other tools like multi-factor authentication, using secure networks and practicing privacy precautions on other connected systems (social media especially) are critical to keeping your data safe. The world of technology never stops changing, if you need some advice or want an evaluation on the security of your company, give us a call. #BeCyberSmart and protect your data.

cybersecurity_infographic.pdf
File Size: 193 kb
File Type: pdf
Download File

    Let's Talk Security!

Submit

Comments are closed.
    GET YOUR
    CYBERSECURITY
    REPORT CARD

    Elroy

    Elroy is the man behind the scenes; writing posts, checking status of servers, managing networks and endpoints, and enjoying coffee in his favorite spots in Lakeland and Winter Haven, FL.

    Archives

    May 2020
    March 2020
    February 2020
    January 2020
    December 2019
    October 2019
    September 2019
    June 2019
    May 2019
    April 2019
    September 2018

    Categories

    All
    Awareness
    Backup
    Best Practices
    Business
    Business Ready
    Business-ready
    Challenges
    Checklist
    Cloud
    Coronavirus
    Cybersecurity
    Disaster Recovery
    Email
    Focus
    Fraud Prevention
    Goals
    Home
    Improvement
    Internet
    Isp
    It Support
    Maintenance Program
    Managed Services
    Microsoft
    Office
    Productivity
    Remote Workforce
    Remote Working
    Saas
    Security
    Speed
    Success
    Support
    Technology

    RSS Feed

LAKELAND

CLOUD | MOBILE
Lakeland, FL 33813
​[email protected]
WINTER HAVEN
MULBERRY
BARTOW
Proudly providing worry-free computer support and operational oversight of your technology infrastructure from Lakeland, FL.
Photo from watts_photos
  • Home
  • Services
    • COVID-19 Remote Work
    • IT Support
    • HVAC IT Services
    • Industrial IT Services
  • About
    • Why Us?
    • Technology Platform
  • Contact
  • IT Pro Blog
    • Florida Hurricanes
    • IT Maturity Index
  • CyberSecurity Report Card
  • Support Center