Top Cyber Security Safety Tips from the Experts

Cyber Security is crucial for any business. Hackers, viruses, and other dangerous applications are always active threats to your company’s sensitive information and productivity. According to Verizon’s 2018 Data Breach Investigations Report (DBIR), 58% of data breach victims are categorized as small businesses. We’ve gathered safety tips that, combined with professional Managed Security Services and an Advanced Firewall, should keep your business up and running.

Password Security

“The use of default or easily guessable passwords is as en
vogue as tight rolling your jeans. Stop it—in fact passwords
regardless of length or complexity are not sufficient on their
own. No matter who administers your POS environment
(whether in-house or outsourced) they should be required to
use two-factor authentication.”     Verizon DBIR 2018

It’s time to stop putting passwords on Post-It notes! Password security is one of the first lines on defense for your IT infrastructure. You can have the best firewall, anti-virus, and DDoS protection available, but weak password security will render your information vulnerable. Have strong, complex passwords with numbers, mixed case letters, and symbols. Two Factor Authentication, verifying your identity with more than just a password,  is quickly becoming a standard in cyber security. It might take a little longer to access your information, but optimal password security is an excellent defense against data breaches.

E-Mail Security

“Both phishing attacks and miscellaneous errors begin with
your staff. Make sure that you conduct regular security training
to lessen the effectiveness the former and have routine
security audits to protect against the latter.”    Verizon DBIR 2018

One of the most common ways that data can be breached is my user error when it comes to E-mail Phishing. Attacks are becoming more and more sophisticated to the point where a phishing scam can resemble an E-mail from a client or fellow employee. First, always double check the recipient’s E-mail address. Just because the name may be someone that you know doesn’t mean it is their correct address. Second, always truly look over the E-mail that you have receive. Small hints may reveal it is an automated scam such as spelling mistakes, not addressing you by name, or lack of a signature below their message. If you do receive an E-mail scam, contact your IT service provider immediately. You never know who else in your office received a similar attack.

Data Security

“Keep highly sensitive and secret data separated from the rest
of your network. Restrict access to it to only those individuals
who absolutely require it to do their jobs. Even then, monitor
that access routinely to make sure the data is not being
copied, moved or accessed in a suspicious manner.    Verizon DBIR 2018

Proper tiers of security are integral to protecting your data from breaches. Different types of information, like financial information, may not be relevant to certain positions in your organization. Those positions who require sensitive information on a daily basis should keep tabs on who is accessing that information an how often.



If your company is like many organizations, your IT infrastructure progressed over time, trying to keep up with the pace of your business. Without the right kind of IT planning and careful technology management all along, your technical environment probably has gaps.

Our IT assessments provide a clear picture of your current IT infrastructure and operations. Whether faced with budget shortfalls, limited resources, aging infrastructure or an outdated strategy, our detailed assessment reports provide relevant findings and recommendations to spur meaningful organizational change.

VISN-IT provides comprehensive assessments of both IT infrastructure and IT operations. Our IT infrastructure assessments evaluate all major infrastructure components, including servers, storage networks, security, desktop infrastructure, end-device hardware and applications. Our IT operations assessments evaluate critical operational areas, such as IT strategic planning, IT staffing, IT operational processes, IT governance, IT vendor management and IT support.


Employee Safety Tips

Part Two of our Cyber Holiday Safety Series focuses on protecting your workplace. Gift card scams and money wiring scams increase this time of year …

Read More →

Online Shopping Safety Tips

Part One of our Cyber Holiday Safety Series focuses on protecting your information while online shopping. Phishing emails focused on fake deals and last minute …

Read More →

New York and New Jersey Data Regulation

If your company does any business in New York or New Jersey, it can be difficult to know what laws pertain to your business. We’ve …

Read More →

Security Alert: Lack of Trust Comes with a High Price Tag for U.S. Businesses

A new study finds that “Almost half (44%) of US consumers have suffered the negative consequences of a security breach or hack…”. The research done by …

Read More →

Preparing for an IT Disaster

IT disasters are devastating to the infrastructure of any business. In 2018, threats to your IT infrastructure are growing no matter what sector your business …

Read More →

Building an Incident Response Program

In part one of our series, our overview of Building an incident response plan, we discussed what regulations organizations will need to meet in order …

Read More →

NetConnect / VISN-IT Featured in StorageCraft Press Release

New StorageCraft Partner Success Program Boosts Profit Paths Across All Channel Partner Business Models DRAPER, Utah, Sept. 27, 2018 /PRNewswire/ — StorageCraft®, whose mission is to protect all …

Read More →

Small Business Cyber Security Concerns

The truth is that Small Businesses have a lot to fear when it comes to Cyber Security. Any disruption that causes downtime or loss of …

Read More →

Email Compromise – How Does it Work?

Email compromises are becoming more and more dangerous every year, and it’s important to know how they work. Email Compromises involve the hacking of a …

Read More →

Cloud Computing Pros and Cons

What is the cloud? Cloud Computing is “the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, …

Read More →

Phishing Threats

Phishing threats are getting more and more sophisticated as cyber security measures become smarter. The main reason why phishing must be handled differently than other …

Read More →

The Dark Web and You

Chances are that somewhere out on the Dark Web lies passwords, email address, and other compromising information that relates to your company. From clicking on …

Read More →

The New Extortion Scam you’ll want to look out for!

Email Threats constantly evolve and try to find new ways to steal your money or steal your information. A large part of Cyber Security is …

Read More →

Two Factor Authentication – Do I Really Need It?

Two Factor Authentication procedures or Multi Factor Authentication procedures are a part of many interactions in our daily life. Most credit and debit cards now …

Read More →

The True Cost of a Data Breach

One of the biggest headaches your company can endure is a data breach. Whether its caused by employee error or targeted cyber attacks, the long …

Read More →