Computer Safety Protocols for your Small Business
In January of this year, 1.76 billion user records leaked. User information and plain text passwords were extracted from 772 million users, while 854 GB of data exposed CV's containing sensitive information on 202 million Chinese users, and an Oklahoma government data leak resulting in 7 years of FBI investigations. Practicing computer safety would have saved millions of people from having to suffer these consequences.
Take advice from the FBI to protect sensitive information against cybercriminals:
- Firewall should ALWAYS be turned on: This is a first step to protecting your business against hackers. You don't want to give away passwords or sensitive information to a cybercriminal. Hardware routers are a good option for protecting multiple computers at your business location.
- Antivirus Software: Antivirus software installed and updated continuously. Antivirus software prevents malicious software programs from embedding on your computer. If malicious code is detected, such as a virus or a worm, it will work to either disarm or remove the problem before it can infect your computer. As an option, you can always set up your Antivirus software automatically.
- Antispyware Technology: STOP cybercriminals from intruding on your sensitive materials on your computer. Avoid ads on the internet offering downloadable antispyware – they may be used by cybercriminals to infect your computer with malicious code or fake spyware.
- Keep your Operating System Up to Date: You want to keep this consistent because doing so assists in correcting security holes and allows your operating system to stay in-tune with technology requirements.
- Don't download from untrusted sources: This includes e-mail attachments, even if it comes from a trusted source, be sure to double-check with a quick phone call directly to that person. And, be wary of opening e-mail attachments from people forwarding the e-mail to you. Malicious code loves to hide within e-mails and could potentially ruin your business in one click.
- Turn off your computer: By doing so breaks the connection with a potential cybercriminal via spyware or a botnet that supplies your computer's resources.