Grounded Planes, Halted Stocks: Why Today's Scary String of Tech Glitches Matter
Grow Your Business, Not Your Inbox
We're recovering from a network connectivity issue & restoring flight ops. We’ll have a waiver on http://t.co/ufFoKFTNNe to change flights.— United (@united) July 8, 2015
(1 of 3) The issue we are experiencing is an internal technical issue and is not the result of a cyber breach.— NYSE (@NYSE) July 8, 2015
We're back up—and ready for the Fed! Thanks for your patience.— Wall Street Journal (@WSJ) July 8, 2015
While everything seems to be back in order, and the Department of Homeland Security and White House each claim there was no foul play behind the glitches, the scary string of events is a reminder to businesses everywhere that protecting your tech systems and online property is of utmost importance.
There are many tools and strategies you can use to keep your company and employee information secure. Here are five.
1. Equip every device with security software and make sure it's kept up to date.
Across all company computers, especially those mobile devices that employees use to work remotely make sure that they are set up with current and regularly updated firewall, malware and spyware software programs. Constantly be scanning for holes or potential issues in your system.
2. Check your email.
As the recent Sony hack shows us, an email leak can be devastating. Be on guard for emails that come with any unusual attachments, or ones that ask for passwords, credit card or bank information, or your Social Security number. Never answer them or forward them -- report them immediately. And look into encrypting your company emails even if you aren't always dealing with super sensitive information.
3. Change up your passwords.
Because it can never be said enough, change your passwords regularly. And don't even think about doing some sort of variation on “12345” or “password.” Come up with passwords using mnemonics or memorable phrases as a base instead. Don't use the same password across all your accounts and utilize two-factor (or more) authentication.
4. Watch payments carefully.
For many big retailers, weaknesses within point of sale systems have made it easy for hackers to pounce. Make sure your system is up to date and compliant with all of the current regulations. Also, while it may seem counterintuitive, consider externalizing your payment processing system; having an in-house system can create a “one-stop shop” for hackers.
5. Vet the outside companies you work with.
If you outsource anything involving customer information to third parties, whether it is credit card information, addresses or something else, thoroughly research the security systems that they have in place. If anything seems off or missing to you, look to work with another firm. Make sure you are satisfied that you and your customers will be secure.
Read more: 5 Tips to Protect Your Business From Hackers