Blog

8 Best Practices for Tech Security in Champaign

Posted by Integrity Staff on April 26, 2018 at 10:00 AM

TechSecurityinChampaign.jpg

Stronger security starts with shoring up best practices. Do the little things well, all of the time and you'll minimize your vulnerabilities. For businesses in Champaign, like yours, adhering to best practices for tech security can be the difference between thriving and being derailed by a security breach. Below are 8 best practices that will help immediately. Share these with your team and keep your business safe.

Here are 8 best practices for tech security in Champaign: 

 

1. Set Complex Passwords 

"GoIllini123" doesn't cut it. Between Google and social media, information about you is more available than ever before. That makes measures like security questions ineffective and it makes simple passwords laughably easy to guess. Set long, nonsensical passwords that no one could reasonably guess and make sure that it's not written down on a Post-It note near your desk.

 

2. Implement Multi-Factor Authentication 

Make multi-factor authentication standard. MFA makes sure that a password isn't the only thing standing between a cyber criminal and access to your company's network. With MFA, you'll need to prove your identity through multiple devices, ensuring that someone pretending to be you faces an uphill battle.

 

3. Invest in a Password Manager

If you read the first item on this list and wondered aloud how you'd possibly remember a bunch of complex passwords, the password manager was invented with you in mind. You're not alone - remembering complex passwords is a tall task. Invest in a password manager and it will store all of your passwords securely. Most password managers or vaults can also help you generate passwords that are difficult to guess.

 

4. Use Secure Channels 

Pay close attention to the channels over which you're sending sensitive information. Is it secure? Is it encrypted? Is it public? Can it be easily hacked? Public Wi-Fi and personal mobile devices are just a couple of examples of channels that aren't often secure. Be wary of when and where you're accessing sensitive data and make sure that you're sending things over secure channels only.

 

5. Limit Admin Access 

In general, limit who has admin access and who can view sensitive data. For the most part, the number of people that need to be able to access the most private information can be counted on one hand. If your organization is too liberal with access, consider pulling back. That will help lessen the chances that private information falls into the wrong hands.

 

6. Encrypt Whenever Possible

Whenever you can, encrypt sensitive information. Don't leave data lying around vulnerable. Encryption makes it so that data isn't understandable to anybody without authorization. Make it standard practice within your business to keep all sensitive data encrypted. 

 

7. Keep Clicking to a Minimum

Most people don't practice safe internet browsing. Make your organization an exception to that rule. Establish that nothing should be clicked on unless the individual is certain of the sender, the intent, and the content. That means no clicking on pop-ups offering free trips, unidentified e-mail attachments, or bizarre URLs. Keeping clicks to a minimum will help keep your business safe of cyber attacks.

 

8. Beware of Strange Requests

Social engineering attacks have become commonplace, targeting businesses from Champaign to California. Phishing, as one example, works like this: someone poses as a trusted authority figure (often someone inside your organization) and asks for sensitive data or access to your company's network. The victim, trusting that they're talking to someone familiar, fulfills the request and lets a criminal in. Make it clear in your organization that nothing will be requested that way.

 

Download Our Security Awareness Guide