Best Practices for Online Safety

Online safety is something everyone should care about. All of your sensitive information such as financial data, identity data, and viewing data are all over every device that you use. Being a victim of a data thief is unfortunately no longer paranoia, as most users in the US have had their information stolen via the numerous data breaches of the past few years.

Whether or not you are aware of any attempts to steal your information, here’s a few tips that can go a long way in keeping your accounts safe.

Change Your Password

Many of the items on this list are going to be things that people don’t want to hear and don’t want to be bothered doing. You may have been able to drift by without changing your passwords in the past, but now it will leave you vulnerable to data breaches. Most experts recommend you change your password at least 2-3 times per year. Some companies even make their employees change their passwords every 30 days!
The reason behind changing your password often is simple: You almost never know when and what data has been stolen before it’s too late. By changing your passwords often you lessen the likelihood that your account gets compromised.

Don’t Use the Same Password Everywhere

Another tough pill to swallow. Users don’t want to have to remember 50 passwords to make their way around the Internet. But the dangers of using the same password for every login are real and present. A data thief will absolutely try using your login information on other popular sites and programs. Its important to try your best to keep the credentials for each site separate and distinct.

Where to Keep Your Passwords

Hanging on to all of your passwords can be more than a chore, especially if you are changing your passwords often and using different passwords for different sites (as you should). What is the safest way to keep a list of your passwords. Password managing programs can be very easy to use and very popular, but even password managers are not free of data breaches. Many experts say that writing down the information and keeping the list secure is actually the safest way to go. While it may not be the most practical, paper can be the safest solution currently available.

Two Factor Authentication

Two Factor Authentication is something that many users tend to be annoyed about. In the fast pace world of business and instant gratification of high speed internet, users want to login and and get straight to their work or content. Two Factor Authentication, to many users, seems like another stop sign in their way. The reason two factor authentication is important is that it is one of the ultimate defenses that your accounts can have. Requiring a code from a text message or an email just to log in to an account stops many accounts from being compromised. In addition, these log in attempts can result in the user being notified instantaneously.
(Click Here for a more detailed explanation on Two Factor Authentication)


Data Breaches can happen to businesses of any size

Sign up to our newsletter and get a FREE Cyber Threat Report 

If your company is like many organizations, your IT infrastructure progressed over time, trying to keep up with the pace of your business. Without the right kind of IT planning and careful technology management all along, your technical environment probably has gaps.

Our IT assessments provide a clear picture of your current IT infrastructure and operations. Whether faced with budget shortfalls, limited resources, aging infrastructure or an outdated strategy, our detailed assessment reports provide relevant findings and recommendations to spur meaningful organizational change.

VISN-IT provides comprehensive assessments of both IT infrastructure and IT operations. Our IT infrastructure assessments evaluate all major infrastructure components, including servers, storage networks, security, desktop infrastructure, end-device hardware and applications. Our IT operations assessments evaluate critical operational areas, such as IT strategic planning, IT staffing, IT operational processes, IT governance, IT vendor management and IT support.

CALL 718-227-5500 NOW FOR A NETWORK ASSESSMENT

Preparing for an IT Disaster

IT disasters are devastating to the infrastructure of any business. In 2018, threats to your IT infrastructure are growing no matter what sector your business ...
Read More →

Building an Incident Response Program

In part one of our series, our overview of Building an incident response plan, we discussed what regulations organizations will need to meet in order ...
Read More →

NetConnect / VISN-IT Featured in StorageCraft Press Release

New StorageCraft Partner Success Program Boosts Profit Paths Across All Channel Partner Business Models DRAPER, Utah, Sept. 27, 2018 /PRNewswire/ — StorageCraft®, whose mission is to protect all ...
Read More →

Small Business Cyber Security Concerns

The truth is that Small Businesses have a lot to fear when it comes to Cyber Security. Any disruption that causes downtime or loss of ...
Read More →

Email Compromise – How Does it Work?

Email compromises are becoming more and more dangerous every year, and it’s important to know how they work.  Email Compromises involve the hacking of a ...
Read More →
Cloud Computing

Cloud Computing Pros and Cons

What is the cloud?  Cloud Computing is “the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, ...
Read More →

Phishing Threats

Phishing threats are getting more and more sophisticated as cyber security measures become smarter. The main reason why phishing must be handled differently than other ...
Read More →

The Dark Web and You

Why Should I Care About the Dark Web? Chances are that somewhere out on the Dark Web lies passwords, email address, and other compromising information ...
Read More →

The New Extortion Scam you’ll want to look out for!

Email Threats constantly evolve and try to find new ways to steal your money or steal your information. A large part of Cyber Security is ...
Read More →

Two Factor Authentication – Do I Really Need It?

Two Factor Authentication procedures or Multi Factor Authentication procedures are a part of many interactions in our daily life. Most credit and debit cards now ...
Read More →

The True Cost of a Data Breach

One of the biggest headaches your company can endure is a data breach. Whether its caused by employee error or targeted cyber attacks, the long ...
Read More →
Employee Data Risk

Employees and Data – Are You At Risk?

One of the main sources of data vulnerability is employees. When owners and executives think of data breaches, however, one of the last places they ...
Read More →

California Consumer Privacy Act and the risk to Small Business

Late last week, California passed the California Consumer Privacy Act of 2018. Effective as of January 1st, 2020, the bill is a big step up ...
Read More →

Data Regulation and the Future

Every day more and more data breaches are occurring. Virtually every consumer in the United States already has had their information leaked to the dark ...
Read More →

Best Practices for Online Safety

Online safety is something everyone should care about. All of your sensitive information such as financial data, identity data, and viewing data are all over ...
Read More →