(281) 816-6430    Get SUPPORT

SouthBridge Consulting Blog

During the Holidays, Cybersecurity Matters at Work and Home

During the Holidays, Cybersecurity Matters at Work and Home

We’re right in the thick of the holiday season, which means two things: one, there’s a lot of data being exchanged between businesses and consumers, and (on a related note) two: there’s ample opportunities for cybercrime, targeting business and consumer both. Whichever side of the coin you are on at any moment, you need to be aware of the risks, and how to mitigate them.

As a Consumer
Let’s face it, the Internet is a fantastic resource for the savvy shopper to use as a means of identifying where the best deals are, be it online or in-store. However, when browsing openly in such a way, you need to ensure that you are doing so as securely as possible.

There are, of course, the more basic steps: making sure your anti-virus software is up-to-date and activated, practicing good password hygiene and strength. In addition to these precautions, there are other measures you can take to help keep the holidays merry and bright, free of a cyberattack.

While you’re browsing, you want to make sure that you are as defended as possible, and that you are browsing intelligently as well. The bar where the website’s URL appears should have a locked padlock somewhere in it, indicating that the website is secure and any data you input (like credit card information, for example) is protected behind encryption. Furthermore, as convenient as a free Wi-Fi connection may seem, it isn’t going to be worth your data being infected as a result.

As a Business’ Representative
Of course, the focus on consumerism that permeates this time of year doesn’t for a moment mean that businesses get a pass when it comes to potential cyberattacks. The holiday season means nothing to attackers, and will not prevent them from leveraging everything they’ve got against your business’ interests. This effectively makes it a requirement for any business to have policies to counteract some of a cybercriminal’s efforts.

These policies should address a couple things, the first of which ensuring that all of your business’ defenses are updated and activated.

Whether it’s your antivirus, your remote access solution, or anything in between, your entire network needs to be maintained and kept up-to-date. This means that any patches that have been released for your solutions should also be applied in addition to regular updates as they are made available.

Your users also need to play a role in your cybersecurity. With the holidays so close, there is likely to be an increase in holiday-themed scams and phishing attempts. A few simple lessons in best practices will help to keep your users aware of these efforts and how to prevent them. Anyone with network access should also be required to authenticate their identity a few times through various means.

Of course, it can also be challenging for a business to keep all this up while simultaneously attending to their regular operations. That’s why we do what we do at SouthBridge Consulting. Give us a call at (281) 816-6430, and have a happy and healthy holiday this year.

Tip of the Week: Windows 10 Improvements to Try
Gift Card Scam Making Problems for Holiday Shopper...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, January 16 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Tech Term Productivity Privacy Internet Business Email Data Data Backup Business Computing Malware Hosted Solutions Cloud IT Support Mobile Devices Computer Software Network Security Hackers Business Management Hardware Outsourced IT Encryption Cloud Computing Small Business IT Services Windows 10 Innovation Government Artificial Intelligence Managed IT Services Google Android Server Holiday Passwords Data Recovery Paperless Office Browser Efficiency Managed Service Website Scam Workplace Tips Smartphones BYOD Healthcare VoIP Infrastructure Two-factor Authentication Wi-Fi Vulnerability Applications Communication Blockchain Information Collaboration Ransomware Bandwidth Employer-Employee Relationship Gmail Office 365 Storage Backup Remote Monitoring User Tips Smartphone Upgrade Saving Money HIPAA Quick Tips Social Media Chrome Antivirus Mobile Security Document Management Microsoft Access Control Network Machine Learning Business Continuity Managed IT services IT Management Managed Service Provider Internet of Things Maintenance Router Data Management Tablet Identity Theft Recycling Save Money Social Wearable Technology Screen Reader Authentication Operating System Users Managed IT Service Modem Vulnerabilities Politics Customer Service Staff Disaster Recovery Enterprise Content Management Multi-Factor Security IT Technicians How To Permission Computing Computing Infrastructure Identity eWaste Features Security Cameras Printer Money Smart Tech Authorization Hard Drive Consulting Downtime Break Fix Virtual Reality Cookies Development Mobile Device Legislation Fraud VPN Spam Smart Technology Social Networking Unified Communications Help Desk Wireless Automation Server Management Assessment Employee-Employer Relationship Test Comparison Alerts Patch Management Private Cloud Mobile Device Management Microsoft Excel Connectivity Employees Remote Computing Cache Managed Services Provider Tech Terms Nanotechnology Cables Instant Messaging Firewall Motherboard Bring Your Own Device Office Risk Management Mirgation Internet Exlporer Remote Workers Communications Specifications Compliance Management Electronic Health Records IoT Remote Monitoring and Management Hotspot Point of Sale Theft Business Technology Wires Finance Augmented Reality Tech Support BDR G Suite Bookmarks Cybersecurity RMM Black Friday Licensing Regulations Company Culture Files SharePoint Data Security Star Wars Zero-Day Threat Mouse Language Chatbots Network Management E-Commerce Financial Dark Web App Facebook The Internet of Things Distributed Denial of Service Chromebook Favorites Microsoft Office Google Calendar Permissions Monitoring Electronic Medical Records Customer Relationship Management Cyber Monday Cooperation Data loss Managing Stress Read Only Downloads Cost Management OneNote Human Error Big Data Fun IP Address Twitter Printers Miscellaneous Mobile Office Virtualization Domains Hard Drives Windows 10 Search Regulation Public Speaking Presentation ROI Lithium-ion battery Cortana Wireless Technology 5G IBM Apps Safety Productivity Marketing Hacker Criminal Justice Gadgets Budget Hiring/Firing Alert Competition