- Update the software on your phone, computer, tablet and any other electronic device regularly. It’s often annoying to download and install regular updates of your operating system, but you wait to update your device’s software, Maxson and Hellmer say you’re giving criminals the opportunity to take advantage of any security weaknesses.
- Air-gap computers that have sensitive information. Air gapping is when you make sure the computer isn’t connected to the internet or to any other computers that themselves are connected to the internet. It’s much more difficult to remotely hack an air-gapped computer.
- Regularly back up all your electronic devices. If you’re hit with ransomware–malicious programs that hackers use to lock your computer and hold it hostage in exchange for money, usually a digital currency–you can restore your computer to the latest backup. Maxon and Hellmer also suggest never paying the ransom to get your information back, even if your computer isn’t backed up.
- Make sure no one can access all of your business information. The sales team should only have access to information pertinent to their team. This prevents hackers from being able to access the entire network through one person.
- Strengthen your passwords. Use passwords that are 10 characters or more, and take advantage of two-factor authentication to protect your emails.
- Be aware of common email scams. For example, escrow scams where criminals pose as a title company and change the wiring instructions, referral scams where criminals promise to send a lead for a small fee, and fake Docusign emails and texts with links. These are all ways criminals can gain access to your information.
- Implement state-compliant policies. This includes policies for handling and disposing personally identifiable information (PII), such as social security numbers and bank information. Also create policies for document protection and disposal, breach notifications and cybersecurity. These measures help reduce the risk of being hacked, and they help if you’re ever civilly sued for negligence.
- Conduct voluntary security audits. Hire a security expert who can identify weak points in your systems and offer solutions for strengthening them.
- Invest in cyber insurance. This will cover the costs of restoring the network and the data, providing breach notifications and credit monitoring.
- Make sure your vendors are following proper cybersecurity protocols. Closely read over the security and privacy policies of the companies you work with and rely upon, and find out what recourse you have–if any–if they are hacked and your information is exposed.
Posted on January 30, 2018 at 10:07 pm Gordon Myers