7 Tips for Staying Safe on Social Media

SEO, Internet marketing e-commerce, online banking payment, and VOIP voice over internet protocol technology on mobile smart phone device app via digital computer communication service security

Social media platforms such as Facebook, Twitter, and Instagram are great for staying in touch with family and friends. With their ease of use these social networks have become the world’s largest database of accessible, personal information. Unfortunately, it is easy to forget that while you are connecting with friends and acquaintances, cyber-scammers and identity thieves are lurking on those platforms too. Here are some guidelines to keep you safe.

Secure Your Privacy Settings
Verify the settings on your social accounts and be sure your phone number and email addresses are hidden from public view. Each platform has specific settings to ensure privacy:

  • In lieu of making them public, adjust Facebook privacy settings so that your posts are only visible to friends or friends of friends.
  • Uncheck the “Discoverability” boxes in Twitter’s safety and security controls to prevent searches using your email address and phone number. If you’re only using Twitter for private communications, check the “Protect your tweets” box, which limits your posts’ visibility.
  • For your personal Instagram page, simply set your account to private.

Be cautious of links and files
If you’re not sure about the destination, don’t download or click on the link. Be wary of out-of-character posts from friends, and always double check the sender’s email address when you receive an email.

Use Text Messaging to Prevent Unauthorized Logins
Save your cell number to each platform and require text messaging to confirm your identity when you log in on a new device. This two-factor authentication or login verification, can keep your accounts secure even if your username and password are stolen.

Keep devices and software updated
Software updates for your desktop and mobile apps include critical security patches that protect your data from new threats. Update your systems as soon as you are notified in order to protect your accounts.

Use discretion on your whereabouts
Don’t share your address, that only helps thieves target your home. In addition, be careful about sharing specific travel plans — your vacant home could quickly become a target.

Keep in mind that you can disclose this information inadvertently if you allow your posts or images to be tagged with your location, so make sure to disable location tagging:

  • Uncheck the “Tweet with location” box on the “Privacy and safety” settings page on Twitter.
  • On Facebook and Instagram, go to your phone’s settings, find location services, and disable them for the individual apps.

Use strong passwords
Passwords are one of the keys to protecting your identity. Be sure to use strong, secure passwords to keep your information safe.

Avoid third-party applications that require access to your profile
Quizzes that promise to identify your celebrity doppelgänger, assemble a bank-heist team, or test your hometown loyalty are often nothing more than information-siphoning schemes. Even though they assure you they won’t post to your feed without permission, their ultimate goal is to woo you into surrendering your profile information and friends list.

You’ll find folks of every stripe on social media: friends, trolls, criminals and more. Stay alert and adopt a few smart practices in order to socialize safely and keep your personal information private.

Posted in SecureIT | Leave a comment

Juvenile32InsaneMonkey! And Other Good Passwords

As your business grows, so does the likelihood of your systems being the target of cybercrime. One of the best ways to protect yourself is by enforcing the use of strong, secure passwords for yourself and your employees. If followed, the guidelines can provide you with a password that is not easily broken.

  1. Be a moving target…change your password often.
  2. Never use the same password for multiple sites. The problem is that if one site gets hacked they all get hacked. The LinkedIn hack of 2016 compromised over 117 million usernames and passwords.  Users that registered the same email address and password on other sites were at risk(and may still be!).
  3. Make sure your password is sufficiently complex.  Passwords like 12345678, password, Password1 are easily guessed. Adding complexity by mixing capitals, lower case, numbers, and special characters like !@#$%^&* makes it very difficult for other people to guess your password.
  4. Make sure your password is long enough. Computers today can guess passwords at an alarmingly fast pace.  Even medium grade hardware can run through millions of password attempts PER SECOND! Complexity makes is more difficult for people to guess your password, and length makes it harder for computers to do so.  
    • 8 character passwords take hours to crack
    • 9 character passwords can take days to crack
    • 10 character passwords can take months to crack
    • 12 character passwords can take centuries to crack
  5. Never share your password or make it easy to find. A sticky note on the bottom of your keyboard is not a secure hiding place!

At ITSecureNow we are fans of the sentence style password like “Juvenile32InsaneMonkey!” or “SmoothRed45Vase$”. These tend to be much easier to remember than randomly generated passwords like Dj$&ch#15D4. They also meet the complexity and length requirements mentioned above.

The team at ITSecurenow are experts in securing networks of all sizes. Contact us today to learn more.

Posted in SecureIT | Tagged , , , , | Leave a comment

Stay Secure on LinkedIn

LinkedIn is a popular social platform for working professionals and organizations to highlight their skills and construct a network. There are many ways to use this platform to your advantage; however, there are security concerns that you should be aware of.

Create Strong Passwords
Creating a strong password is the first step to protecting your account. A common mistake is using the same password for multiple accounts which can make them all vulnerable if even one site suffers a data breach. LinkedIn has been the victim of cybercrime in the past and a post-mortem showed that LinkedIn was plagued with weak and duplicated passwords.

To ensure safety, your password should:

  • Be complex
  • Be unique
  • Be secure
  • Require two-step verification

Beware of Bogus Profiles
There are security measures set up by default in LInkedIn that will hide your contact information from those who are not in your network. But if you accept a fake profile into your network then your information is already in jeopardy. With access to your work history, email, and other connections, someone behind a fake profile could steal your identity.

Luckily there are some tell-tale signs of a fake profile:

  • Spelling and grammar mistakes
  • Unlikely or “too good to be true” requests
  • Odd work history

Avoid Phishing Emails
LinkedIn communicates to its users by sending messages to their Inbox. These messages include updates on new connections, new endorsements or policy changes. These messages are read only and are typically legitimate communications. However, if you receive an email requesting documentation to verify your identity, it is most likely a phishing scam.

Ways to look for signs that indicate the message is a phishing scam include:

  • Spelling and grammar errors
  • Hovering over links to see where they go (Don’t click the link)
  • Verify the sender

ITSecureNow is dedicated to protecting our clients’ security.  Watch this video to better understand the security concerns surrounding LinkedIn and how you can stay secure while using their platform.

Read “3 Easy Steps to Improve Computer Security” on our blog for more tips on how to protect your business.

Posted in SecureIT | Tagged , , , , , | Leave a comment

ITsecurenow’s Tech Predictions for 2018

We are almost a full month into the New Year, and given all the happened in 2017, 2018 is welcomed opportunity for added IT security.

ITsecureNow sets ourselves apart from other companies in our industry with our state-of-the-art equipment and knowledgeable team members. We recently sat down with Network Security Engineer Paul Fields to get a better understanding of what happened in 2017 and what we can expect in 2018.

Paul works closely with our CEO, Lorne Sykora. He mastered the skill of adaptability working one summer as a dog fence installer and easily describes ITsecureNow as committed, collaborative and valuable. Here is what Paul has to say about his work, data security and what he expects to see in 2018!

What is the most unusual job you have had?
I installed underground dog fences for a summer.  Anytime you have pets and pet owners as part of your day to day work, interesting things are likely to happen!  Although many of the jobs were interesting, one in particular sticks out to me.  Usually when people want an underground dog fence it is for their yard.  However, I had a customer who wanted a fence installed in the crawlspace of her home so that her dog could only go into certain rooms of the house.  It was extremely complicated developing the layout for the wiring so that the dog could move freely in the rooms that he was allowed in while being prevented from entering rooms he was not.

What is one skill you would like to master?
If I could master the skill of effective communication my job would be much easier.  Understanding a customer’s point of view, needs, wants and pain points greatly determines what kind of direction ITSecureNow would recommend to a them.  

What is your favorite part of your job?
I love the fact that I never stop learning new things.  I am always studying the newest technologies as well as learning about how companies do business.  The crux of my job is to figure out how to bring those two things together to accomplish our client’s goals.

What were some of the biggest developments you saw in 2017?
While massive breaches like Yahoo and Equifax dominated the headlines, in 2017 more than half of all cyber attacks were targeted at small to medium-sized businesses.   Attackers have started to wake up to the fact that smaller businesses have valuable information and usually fewer resources to protect themselves, making them an easier target.  Ransomware, phishing, and malware attacks continued to be the most effective ways that attackers gained entry into company networks.

Where do you think the security industry will go in 2018?
When it comes to information security, companies are starting to see the benefit in prevention.  The consensus is that more companies, large and small, will increase their security budgets to get out ahead of the curve.  Cyber attacks will continue to grow in both frequency and scale, especially in the small to medium-sized business market.  I see a trend of 2018 that information security will continue to become a “part of doing business” rather than something reserved for multinational corporations.  In return, the security industry should continue to move in the direction of trying to be more business conscious, helping companies to maximize productivity as well as security.

What is the best advice you can provide someone to protect himself or herself going forward ?

  1. Whenever possible, apply patches to your operating systems(Windows Updates), as well as third party software like java, Chrome, Firefox, Adobe products, etc. 
  2. Do not use the same password for everything.  The danger in it is if one account is compromised then all of your accounts are at risk.  It is best practice to have a different password for every service that you use.  Password Managers are great in helping with this.
  3. In work environments make sure that administrative rights are limited to only those that absolutely need it.  End users that can install their own software are also capable of inadvertently installing malware that can cost your organization a great deal of time, money and reputation.
  4. Make sure to change any default passwords on devices that are on your networks.  This includes routers, switches, firewalls, etc.  IoT devices like wireless surveillance cameras, webcams, wireless thermostats, wireless speaker systems, wireless lighting solutions, and the like are notorious for having default credentials left intact, thus making them vulnerable to attack.

Knowledge is power. View our Cyber Security Infographic to understand the state of cyber security. For more information on our services, or to get started, contact the experts at ITsecurenow today.

Posted in SecureIT | Tagged , , , , | Leave a comment

Cyber Security Statistics Infographic

Did you know that over 40% of cyber attacks target small businesses? Take a look at the infographic from the ITSecurenow team below to learn more about the state of cyber security.

Posted in SecureIT | Tagged , , , , | Leave a comment

8 Alarming Security Facts for Small Businesses

The cyber-security industry is rapidly growing in response to the number of cyber-crimes that continue to plague businesses large and small. It is clear that no organization, regardless of its size or vertical, is safe from a data breach.

According to “The State of Cybersecurity in Small and Medium- Sized Businesses” conducted by Ponemon Institute,  “Cyber attacks, ransomware and disruptive technologies, such as the Internet of Things (IoT), challenge the ability of small businesses to safeguard their information assets.” Their survey showed that 61 percent of respondents experienced some type of cyber attack in the past 12 months, and 54 percent of those data breaches involved customer and employee information. These attacks cost organizations an average of $1,027,053 each year, due to damage or theft.

Cyber-crime continues to be a real threat. Consider some of these pressing cyber-security statistics as you plan for the New Year:

  1. 54 percent of businesses state negligent employees were the root cause of data breaches, an increase from 48 percent from last year. (State of Cybersecurity in Small and Medium Sized Businesses)
  2. Only 29 percent of respondents say they have confidence in their ability to contain or minimize the risk of an insecure Internet of Things. (State of Cybersecurity in Small and Medium Sized Businesses)
  3. It is evident that strong passwords are an essential part of maintaining data security. However, 59 percent of businesses say password policies are not strictly enforced. (State of Cybersecurity in Small and Medium Sized Businesses)
  4. 62 percent of breaches were the result of cyber-crime. (2017 Data Breach Institute Report)
  5. 81 percent of hacking-related breaches leveraged stolen or weak passwords. (State of Cybersecurity in Small and Medium Sized Businesses)
  6. 66 percent of malware was installed via malicious email attachments. (2017 Data Breach Institute Report)
  7. From 2016 to 2017 the average cost of damage or theft of IT assets and infrastructure increased from $879,582 to $1,027,053. The average cost due to disruption to normal operations increased from $955,429 to $1,207,965. 
(2017 Data Breach Institute Report)
  8. Businesses are losing more records in a data breach. Companies represented in this research lost an average of more than 9,350 individual records as a result of the data breach. (2017 Data Breach Institute Report)

As you prepare for the New Year, keep your organization’s security at the top of your concerns. Contact ITSecureNow to learn how we make your security our top priority.

Posted in ProactiveIT | Tagged , , , | Leave a comment

3 Easy Steps To Improve Computer Security

The Internet is a valuable tool. Employees are able to work in remote and home office settings and also stay productive on the road through the use of various applications and cloud-based services. Families are able to stay connected to loved ones far and near with the simple click of a mouse. It also provides an opportunity for criminals to easily gain access to critical information. Now, more than ever, it is important to stay safe online.

Various threats, including viruses, malicious software, and data breaches can compromise personal information and have devastating effects on individuals and businesses. While these threats can never be completely avoided there are steps you can take to reduce your risk of being a victim of a cyber-criminal.

1. Amp up your password

Strong passwords are a cyber-thief’s greatest enemy. Be sure to use a combination of letters, numbers and symbols to make it more difficult. Never use a complete word; those are the easiest for hackers to guess. There are a variety of tools available online that will help generate random passwords for you to use. And be sure to use a different password for each website. If the same password is used for each place you login, it is much easier for a hacker to take over your identity online.

2. Set up two-factor authentication

Two-factor authentication confirms your identity by sending a unique code to your phone or email to use before being able to login to a website. This improves security because the person trying to hack into your account would have to have access to both platforms to login successfully. While this does take extra time, it is definitely worth setting up to keep your account safe.

3. Keep up to date with system patches

Perform your computer or phone’s operating system update as soon as you are prompted to do so. These updates often fix bugs in the system and patch security flaws that can be exploited by malware.

Cyber-security is imperative to the protection of your personal information. For more information on how you can protect yourself from falling victim to the next security breach, read “Three Best Security Practices” on our blog and contact the security experts at ITSecurenow.

Posted in SecureIT | Tagged , , , , , , | Leave a comment

13 Haunting Cyber Security Statistics

Tales of true terror are happening in data centers far and near. Sinister outages and bone-chilling cyber security threats are enough to give any IT professional nightmares. Daily news reports highlight the latest victims in the ghastly data breach saga. The team at ITSecurenow gathered these haunting facts about cyber security. Read on…if you dare!

  1. The cost of an average data breach is $3.62 billion. (Source: IBM)
  2. The cost of cybercrime is expected to reach over $2 trillion by 2019. (Source: Juniper Research)
  3. Over 80% of cyber attacks are due to stolen or weak passwords. (Source: Panda Security)
  4. Over 60 percent of Americans are willing to pay a ransom for internet extortion. (Source: Symantec)
  5. Email is more dangerous than ever with 1 in 31 emails containing malware. (Source: Cicso)
  6. Over 75 percent of all legitimate websites have unpatched vulnerabilities. (Source: Symantec)
  7. Because there are so many attacks, as many as 44 percent go uninvestigated. (Source: Cisco)
  8. Corporate email accounts are 6 times more likely to be targeted by a phishing scam. (Source: Panda Security)
  9. 71 percent of attacks in healthcare and 58 percent of attacks in financial industries came from an inside source. (Source: IBM)
  10. Over 40 percent of attacks target small businesses. (Source: Small Business Trends)
  11. 69 percent of small businesses lack the budget and staff to keep up with threats and only 33 percent believes their organization can prevent an attack from occurring. (Source: Ponemon Institute)
  12. 2 billion personal records were stolen in 2016. (Source: CNBC)
  13. 52 percent of businesses state that their security officers lack an understanding of their business operations. (Source: ISACA)

The old adage “it will never happen to me” is dangerously untrue. However, the nightmare can end. The villains don’t have to win. The professionals at ITSecurenow offer our Breach Prevention Platform, a tool to help prevent your business from being the latest victim in the terrifying cyber security attacks. Contact us today so we can show you how we can help protect your business.

Posted in StrategicIT | Tagged , , , , | Leave a comment

3 Steps to Better Security

With a new security threat seemingly popping up every other week it can be hard to know what to do to best protect yourself and your business. Ultimately some of the best ways to keep your data secure are to following the industry “rules of thumb”. Below are a few of these best practices from Fireproof IT Manager and vCIO at ITSecurenow, Lorne Sykora.

Posted in StrategicIT | Tagged , , , | Leave a comment

Free IT Security Assessment from ITSecurenow

Proactive. Secure. Strategic.

Contact us now for your FREE Vulnerability Assessment.

ITSecurenow is changing the way Managed IT Services are delivered by offering end to end security with proactive business technology solutions. We keep your technology humming so you can focus on running your business.

ProactiveIT
Virus, Malware & Spam Protection
Network Monitoring
Onsite & Remote Support

SecureIT
Security Training
Security Policies
Risk Management Reporting

StrategicIT
vCIO
Risk Mitigation
Review New Technologies

614.317.9236 | www.itsecurenow.com | sales@itsecurenow.com

Posted in ProactiveIT, SecureIT, StrategicIT | Tagged , , | Leave a comment