Norris Computer Consulting
  • Home
  • Our Mission
  • What We Do
  • Pricing & Billing
  • About
  • Contact
  • Helpful Info
    • Access to Learning
    • Cloud for Small Business >
      • Advantages for Small Business
    • Security Info >
      • Summary Security Stance
      • Security Catagory Details
      • What to do after a cyber attack
      • Public Wifi Safety Tips
    • Tech News
    • Windows 10 Info

​SIMPLE BUT PROFOUND WAYS TO STRENGTHEN
YOUR SECURITY STANCE 


According to the US Chamber of Commerce, "A cybersecurity breach occurs, on average, every 39 seconds.  Additionally, the United States experiences the most data breaches out of any other country: In 2017 alone, cybercrime cost small- and medium-sized businesses more than $2.2 million." 1 
1. https://www.uschamber.com/co/run/technology/data-backup-basics

12 IMPORTANT STEPS TO TAKE YOUR STAND AGAINST A CYBER ATTACK
  1. Consider using a dedicated password manager.  It can help create, remember, store, encrypt, and recall passwords to simplify accesses with one strong master password.  If you do not use a password manager, be careful where you store your passwords.  If you use software to store them, do encrypt the file they live in with a strong password.  If you write them down keep that document secure with limited access. Touch Password Manager link to see a comparison of 3 Password Managers:  Password Manager
  2. Use a long passphrase...for a password for your password manager or online accesses. If you use a password manager, a long secure password will be created for your online accesses.  Touch PassPhrase link for ideas on how to construct:  PassPhrase
  3. If available use 2FA - Two Factor Authentication right away.  This adds an extra step to access your account, and makes it harder or more cumbersome for a cyber attack to access your account.  Touch 2FA link for an explanation:   2FA
  4. Never use the same password on your accounts ever...Yes I said never ever...If your credentials are ever stolen or compromised,  automated attempts will be used to check to see if your username and password will work on over 1000 plus websites. Touch link Top 10 Mistakes to explain:  Top 10 Mistakes  
  5. Backup your business and personal data locally and on the cloud. For some businesses the cloud may not be a safe option. Touch the link Backing Up Data to the Cloud and Locally:  Backing Up Data to the Cloud and Locally 
  6. Ensure you have the latest security updates or patches for all applications, operating systems, hardware, software, virus and malware scanners:  allow updates to install for each.  If you have a reason not to, you put your system, your customers, your business at adverse risk.  Touch Keep Up To Date link to see how to update your operating system or device:  Keep Up To Date
  7. Never...give out sensitive information via phone, text, voice mail, email, or look alike websites asking for sensitive information.  All of these attempts try to trick into taking some action based on some sense of urgency by impersonating a business, government agency, co-workers, friends, credit card account, or a bank you use.  Always beware of anyone asking for login or personal information, hangup, do not reply to an email, do not click on a link in your email or SMS text message to a supposed website to fix a problem with an account, or to call to fix a supposed problem. A social engineering effort is designed to trick you into doing just that: give out sensitive information.  If in doubt say no and verify any request for login or account information through official recognized contact methods first. Touch Social Engineering link to learn about attempts to trick you into action: Social Engineering
  8. Verify transactions to transfer money. Recent attempts include impersonating an escrow company with similar looking email addressing and email letter head with signatures appearing to be an escrow officer. The attacker had asked for real estate transaction funds to be transferred to the bank (the attackers bank). This nearly cost a San Diego family over half a million dollars, others have not been so fortunate.  Touch Real Estate Escrow Scam link to see local San Diego ABC 10 Video News story:  Real Estate Escrow Scam
  9. ​Do not use public WiFi to access sensitive information such as banking, paying bills, any financial transaction, work related websites, etc. Touch Public WiFi link for more information:  Public WiFi​
  10. Consider using a VPN for connections to work or accessing sensitive information. A VPN - Virtual Private Network encrypts data traffic on a network. When considering a VPN, do your homework according to what need you have.  For instance are you a novice user just wanting to create a more secure connection using a public WiFi, or are you a journalist traveling to a country with internet restrictions.  The following links are just a start to begin your research, and are not a complete list. Please use due diligence in your research with this subject. All VPN's have some sort of caveat. Touch Free VPN or Pay VPN links to learn more:  Free VPN  Pay VPN
  11. Increase Your Cyber Awareness. Numerous techniques can be in place to protect you, but all of it can be tossed on end, by your device and online practices, and your awareness or lack thereof.  So take steps to protect yourself, family, and co-workers by increasing your knowledge and awareness.  You can do that by exploring the SECURITY section of this website accessed from the menu bar at the top of this page for ideas and videos about device, application, and user security practices. Security 
  12. Please feel free to share these topics and website with those you care about! 

 All topics shown in summary page and details page, and their articles are from established recognized public resources for ideas to help secure your computer and device environments. They highlight what are considered best practices over a broad range of issues; however, do not cover every possible scenario.  You will notice there is a degree of consensus among public, private, and educational areas.  That being said, it is our hope that you find these resources practical, useful, and effective in reducing openings in your computer and device security and practices.

CONTACT
Proudly powered by Weebly
  • Home
  • Our Mission
  • What We Do
  • Pricing & Billing
  • About
  • Contact
  • Helpful Info
    • Access to Learning
    • Cloud for Small Business >
      • Advantages for Small Business
    • Security Info >
      • Summary Security Stance
      • Security Catagory Details
      • What to do after a cyber attack
      • Public Wifi Safety Tips
    • Tech News
    • Windows 10 Info