TechTip Postcard

   Insider Tips and Secrets to Get the MOST Out of Your Computer       Oct2015 – VOL 1 – ISSUE 10

Your Computer Network Is Being Haunted!

(And It’s Worse Than Ghosts And Goblins)

Your small business is under attack. Right now, extremely dangerous and well-funded cybercrime rings are using sophisticated techniques to hack into thousands of small businesses to steal credit cards, blackmail you to recover data and swindle money directly out of your bank account.

82,000 NEW malware threats are being released every single day and HALF of the cyber-attacks occurring are aimed at small businesses just like yours. You just don’t hear about it because it’s kept quiet for fear of bad PR, lawsuits and sheer embarrassment.

The National Cyber Security Alliance reports that 1 in 5 small businesses have been victims of cybercrime in the last year and this number is growing rapidly as businesses continue to move to cloud computing, mobile devices and store more information online.

 

Here are 7 critical security measures your business must have in place to have any chance of fending off these criminals:

  1. Train Employees On Security Best Practices. The #1 vulnerability for business networks are the employees using them. If they don’t know how to spot infected e-mails or online scams, they could infect your entire network.
  2. Create An Acceptable Use Policy (AUP) And Enforce It! An AUP outlines how employees are permitted to use company-owned PCs, devices, software, Internet access and e-mail. Having this type of policy is especially critical if your employees are using their own devices to access company email and data.
  3. Require STRONG passwords throughout your company. Passwords should be at least 8 characters and contain lowercase and uppercase letters, symbols and at least one number.
  4. Keep Your Network Up To Date. New vulnerabilities are found almost daily on common software programs you use all the time; therefore it’s critical you patch and update systems frequently.
  5. Have An Excellent Backup. A quality backup can foil even the most aggressive ransomware attacks, where a hacker locks up your files and holds them ransom until you pay up. If your files are backed up, you don’t have to pay to get your data back.
  6. Don’t Allow Employees To Download Unauthorized Software. One of the fastest ways to access your network is by embedding malicious code in seemingly harmless apps.
  7. Don’t Scrimp On A Good Firewall. Your firewall is the frontline defense against hackers, so you need a really good one with monitoring and maintenance done regularly.

Want Help In Implementing These 7 Essentials?

During the month of October, sign up for a FREE
Cybersecurity Audit (a $497 value). To claim your FREE
Cybersecurity Audit either give us a call at
587.523.2252 or fill out and submit the form to
the right.

(This offer is only valid during the month of October 2015)

 


 

Dennis Lawrence Edit Small

Dennis Lawrence, President and CEO of AbleIT

Cybersecurity Audit Reveals Your Vulnerabilities To Hacker Attacks, Data Loss And Extended Downtime

 

Claim your FREE Cybersecurity Audit and get answers to these critical questions:






 

Sign up for a FREE Cybersecurity Audit
(a $497 value)

To claim your free Cybersecurity Audit either give us a call at 587.523.2252 or fill and submit the form below and one of our trained professionals will contact you shortly!

This offer is only valid during the month of October 2015.





  • Is your network really and truly secured against the most devious of cybercriminals?
  • Is the data on your mobile devices (notebooks, tablets, phones) protected from theft or loss?
  • Is your system TRULY backing up ALL of the important files and data you would never want to lose?
  • Is your firewall, anti-spam  and antivirus strong enough to keep the bad guys out?
  • Is your wireless equipment is sufficiently locked down to prevent outside access?
  • Are your employees freely using the Internet to access risky websites that make your company more vulnerable to attack?
  • Are your employees storing confidential and important information on unprotected cloud apps that are OUTSIDE of your backups and your control?

 

Click here for more information