Top 5 Ways Hackers Break Into Your Security Systems (and what to do about it.)
October is National Cybersecurity Awareness Month – are your laptops up-to-date? Is it time to be “out with the old” and introduce the new? What about those old iPhone 7s hanging around the office? Where did those end up? Having outdated devices lying around in desk drawers are an invitation for an unwitting security breach. Here are the 5 most common ways hackers can break into your company’s security systems and what to do about it:
1) Sticky Note Passwords
How many of you have stuck an id/pw onto the monitor of your computer? Or written passwords in a notebook that’s been scribbled out a thousand times? Encourage employees to use LastPass or another password program to safely store your passwords. Sticky notes can be easily lifted, photographed and used to access sensitive files.
2) Read Twice, Click Once
Seriously. If that email looks “phishy” to you, read the sender’s email first, the subject line second. Resist the temptation to click on something that’s addressed to “Dear Friend.”
3) White Board – Erase it.
Not only is it good etiquette to erase the whiteboard after a meeting for the next person, it’s avoids a common security leak. Do you have fourth quarter results on there? Sales targets? Potential clients? It take seconds for someone to snap a photo of your notes and sabotage your efforts. Clean the Slate.
4) Lock Your Cell Phone or Laptop
Did you know you can easily lock your cell phone? It’s a 4 to 6-digit code that can save your sensitive notes. Is it a pain? Yes, but not nearly as painful as having all your data fall into the wrong hands. It’s easy to lock a Windows computer – just use “CTRL” +ALT+DEL and select “Lock” or press the Windows Icon in the lower left +L
For Macs, press CTRL + the 4-leaf clover key that’s also labeled “Command” button briefly and that should do the trick.
5) Out with the Old – Destroy old iphones
The biggest security threat is tossing your old phones out at the landfill. First of all, it’s illegal in many states and secondly, it leaves your company open to threats. Have your devices securely destroyed by our NAICS certified facility, giving you peace of mind. Don’t forget to inform employees that this is your company policy. Many will simply toss a device in the garbage can without a second thought. Informing employees as to WHY it’s mission critical to the welfare of the company (and their continued employment…) may change that behavior. Having a clear policy and an easy way for employees to dispose of old, unwanted devices can vastly improve the security of your enterprise.
Ship n Destroy has a simple way of disposing of unwanted devices that can be shipped from anywhere and destroyed securely. You can learn more at our website, http://shipndestroy.com