October is National Cyber Security Awareness Month. In recognition, we're rounding up some of our top security blog posts and tips from the past few years. There is never a 100% guarantee when it comes to data security. But following the advice in these posts, along with implementing the right system, will certainly get you a lot closer.
This post outlines basic data security best practices. We hope you're already following the advice covered in this post! But we get it - if you're not thinking about it every day, like we are, it can be easy to forget about data security. Read this as a refresher post and make it a goal to follow the tips every day. Read Now
In the post, we cover common security threats you face while out in public and what you can do to keep your data safe. Read this one if you travel for work or if you ever work outside the office (or if you connect to public Wi-Fi in your private time!). We cover threats like rogue access points and safety tips like two-factor authentication (also called dual factor authentication). Read Now
Like the name suggests, this post is about staying safe on vacation - but if you travel frequently for work, this advice applies to you, too! Read Now
If you've created a new password anytime recently, you were probably required to use a combination of numbers, letters and special characters. But that may not necessarily mean your password is secure. Read this post to find out some tips for creating a secure password and get links to test your password strength. Read Now
This is still one of our most popular blog posts. It was originally written in 2013 when the Cryptolocker malware first started getting attention and updated recently. It tells you how to block EXE file attachments (one of those popular ways to send malware) in Office 365. Read Now
Learn about some of the built-in options for customization in Office 365 that you can use to protect your sensitive data. This post covers disclaimers, blocking domains and data loss prevention. These are especially useful for companies dealing with sensitive customer data or who regularly have to email customer information. Read Now
This post covered encrypted email: How it works and what it will look like to your recipients. It's primarily geared towards the healthcare field but if your company deals with ANY sensitive data on a regular basis (credit cards, SSNs, legal information, etc), encrypted email is something you may want to look into. Read Now
This covers a few recent data breaches on iOS and Android platforms and covers mobile device policies. If your employees are using their phones or tablets for work (they probably are, even if you issued them a phone), this one is especially important for you. Read Now
This post covers what you need to know about staying HIPAA and HITECH compliant and storing your inforamtion in the cloud. A common misconception is that the cloud isn't safe - but it can be! We talk about that, along with business agreements - necessary to HIPAA compliance. Read Now
If an old server doesn't sound like a security threat to you, then you need to read this post. Storing ANY information on a server that has reached end of service is a huge risk to your business. This post explains why it a risk and what the process is for migrating to a new system. Read Now
It's important to remember that just following the advice in these posts isn't enough to keep your business safe if you don't also have the right system in place. A firewall you bought a couple of years ago and haven't touched since isn't doing much to keep you safe. Data security threats are constantly evolving and your data security should be evolving with it. If you have any questions about data security, or just want a check on your current data security set up, please contact us.