<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IT Security Archives - TechTastic</title>
	<atom:link href="https://www.techtastic.biz/topics/it-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.techtastic.biz/topics/it-security/</link>
	<description>Fantastic Technicians</description>
	<lastBuildDate>Mon, 22 Oct 2018 14:59:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>
<site xmlns="com-wordpress:feed-additions:1">151403479</site>	<item>
		<title>5 Ways SMBs Can Save Money on Security</title>
		<link>https://www.techtastic.biz/small-business-it/save-money-on-security/</link>
					<comments>https://www.techtastic.biz/small-business-it/save-money-on-security/#_comments</comments>
		
		<dc:creator><![CDATA[Zion Finck]]></dc:creator>
		<pubDate>Wed, 17 Oct 2018 14:54:41 +0000</pubDate>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Online Security]]></category>
		<category><![CDATA[Small Business IT]]></category>
		<guid isPermaLink="false">https://www.techtastic.biz/?p=5537</guid>

					<description><![CDATA[<p>Small-to-medium sized businesses and large enterprises may seem worlds apart, but they face many of the same cyber-security threats. In fact, in recent years, cyber-criminals have increasingly targeted SMBs. This is because it’s widely known that SMBs have a smaller budget, and less in-house expertise, to devote to protection. Thankfully, there are several things SMBs&#8230;</p>
<p>The post <a href="https://www.techtastic.biz/small-business-it/save-money-on-security/">5 Ways SMBs Can Save Money on Security</a> appeared first on <a href="https://www.techtastic.biz">TechTastic</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Small-to-medium sized businesses and large enterprises may seem worlds apart, but they face many of the same cyber-security threats. In fact, in recent years, cyber-criminals have increasingly targeted SMBs. This is because it’s widely known that SMBs have a smaller budget, and less in-house expertise, to devote to protection. Thankfully, there are several things SMBs can do today to get more from even the most limited security budget and save money on security. And, no, we aren’t talking about cutting corners. Far too often, SMBs cut the wrong corners and it ends up costing them more money in the long run. It’s a matter of taking a smarter approach to security. Here are five smart approaches to take.</p>
<ul>
<li>Prioritize &#8211; Every business has specific areas or assets critical to its core operations. Seek the input of valued staff and team members to determine what these are. Is there certain data that would be catastrophic if it was lost or stolen? If hackers compromise a network, or prevent access to certain applications, how disruptive would it be to daily business operations? What kind of potential threats or vulnerabilities pose the greatest risk to the company or your customers/clients? Focus on the most likely risks, not theoretical risks that &#8220;could happen.&#8221; Asking such questions gives you a clearer and more complete perspective as to where to focus available security resources.</li>
<li>Develop and Enforce Policies &#8211; Every SMB needs to implement a security policy to direct employees on appropriate and inappropriate workplace behaviors relative to network, systems, and data security. Merely drafting this document isn&#8217;t enough. Employees must be held accountable if they fail to adhere to policy. Such policies should be updated regularly to reflect new technology and cultural shifts. For example, a document written before social media took off, or before the BYOD (Bring-Your-Own-Device) movement, doesn&#8217;t necessarily apply today.</li>
<li>Education &#8211; Ongoing end user training must be provided. Many security breaches happen because employees fail to recognize phishing schemes, open emails from unknown sources, create poor passwords that are seldom changed, and don&#8217;t take proper precautions when using public Wi-Fi connections on personal mobile devices also used for work.</li>
<li>Take to the Cloud &#8211; Running applications and servers in-house is a costly endeavor. Leveraging the cloud today allows SMBs to cut costs while also strengthening their security. Cloud operators typically have built-in security features, alleviating SMBs of the burden of maintaining security themselves. Today, not only can SMBs shift much of the burden of IT to the cloud, but they can also outsource much of their security by taking advantage of the remote monitoring, maintenance, and security tools provided by Managed Service Providers (MSPs).</li>
<li>Don’t Aim for Perfection – There is no such thing as perfect security.  Striving for perfection is expensive and can prove to be more costly in the end.  Improving protection and response would be a more ideal allocation of funds.  It can take a hacker several months to figure out your systems and do real damage.  Having the ability to quickly detect their presence, and mitigate any potential damage they may cause, is a more realistic and less expensive approach than thinking you can completely remove any probability whatsoever of a hacker breaching your system.</li>
</ul>
<p>Read more about small business IT security by <a href="https://www.techtastic.biz/topics/online-security/">reading all of our blog posts</a> on the subject.</p>
<p>The post <a href="https://www.techtastic.biz/small-business-it/save-money-on-security/">5 Ways SMBs Can Save Money on Security</a> appeared first on <a href="https://www.techtastic.biz">TechTastic</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.techtastic.biz/small-business-it/save-money-on-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5537</post-id>	</item>
		<item>
		<title>DNS Hacking: Just Because You’re Not a Big Target, Doesn’t Mean You’re Safe</title>
		<link>https://www.techtastic.biz/it-security/dns-hacking-not-a-target-doesnt-mean-youre-safe/</link>
					<comments>https://www.techtastic.biz/it-security/dns-hacking-not-a-target-doesnt-mean-youre-safe/#_comments</comments>
		
		<dc:creator><![CDATA[Zion Finck]]></dc:creator>
		<pubDate>Thu, 04 Oct 2018 01:44:17 +0000</pubDate>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Online Security]]></category>
		<guid isPermaLink="false">https://www.techtastic.biz/?p=5521</guid>

					<description><![CDATA[<p>Not too long ago, the New York Time&#8217;s website experienced a well-publicized attack, which raises the question – how can this happen to such a world-renowned corporation? If this can happen to the New York Times, what does this bode for the security of a small company&#8217;s website? What&#8217;s to stop someone from sending visitors&#8230;</p>
<p>The post <a href="https://www.techtastic.biz/it-security/dns-hacking-not-a-target-doesnt-mean-youre-safe/">DNS Hacking: Just Because You’re Not a Big Target, Doesn’t Mean You’re Safe</a> appeared first on <a href="https://www.techtastic.biz">TechTastic</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Not too long ago, the New York Time&#8217;s website experienced a well-publicized attack, which raises the question – how can this happen to such a world-renowned corporation? If this can happen to the New York Times, what does this bode for the security of a small company&#8217;s website? What&#8217;s to stop someone from sending visitors of your site to an adult site or something equally offensive?</p>
<p>The short answer to that question is nothing. In the New York time&#8217;s attack, the attackers changed the newspaper&#8217;s Domain Name System (DNS) records to send visitors to a Syrian website. The same type of thing can very well happen to your business website. For a clearer perspective, let&#8217;s get into the specifics of the attack and explain what DNS is.</p>
<p>The perpetrators of the New York Time&#8217;s attack targeted the site&#8217;s Internet DNS records. To better understand this, know that computers communicate in numbers, whereas we speak in letters. In order for us to have an easy-to-remember destination like nytimes.com, the IP address must be converted to that particular URL through DNS.</p>
<p>Therefore, no matter how big or small a company’s online presence is, every website is vulnerable to the same DNS hacking as the New York Time&#8217;s site. The good news is the websites of smaller companies or organizations fly under the radar and rarely targeted. Larger targets like the New York Times, or LinkedIn, which was recently redirected to a domain sales page, are more likely targets.</p>
<p>For now&#8230; There is no reason to panic and prioritize securing DNS over other things right now. But there is a belief that DNS vulnerability will be something cybercriminals pick on more often down the road.</p>
<h2>Here are a few ways to stay safe from DNS Hacking…</h2>
<p>Select a Registrar with a Solid Reputation for Security</p>
<p>Chances are, you purchased your domain name through a reputable registrar like GoDaddy, Bluehost, 1&amp;1, or Dreamhost. Obviously, you need to create a strong password for when you log into the registrar to manage your site&#8217;s files. Nonetheless, recent DNS attacks are concerning because they&#8217;re far more than the average password hack.</p>
<p>It was actually the security of the registrars themselves that was compromised in recent attacks. The attackers were basically able to change any DNS record in that registrar&#8217;s directory. What&#8217;s particularly frightening is the registrars attacked had solid reputations. The New York Time&#8217;s, along with sites like Twitter and the Huffington Post, is registered with Melbourne IT. LinkedIn, Craigslist and US Airways are registered with Network Solutions. Both had been believed to be secure.</p>
<h2>DNS Hacking, What Else Can Be Done?</h2>
<p>Set Up a Registry Lock &amp; Inquire About Other Optional Security<br />
A registry lock makes it difficult for anyone to make even the most mundane changes to your registrar account without manual intervention by a staff registrar. This likely comes at an additional cost and not every domain registrar has it available.</p>
<p>Ask your registrar about registry locking and other additional security measures like two factor authentication, which requires another verifying factor in addition to your login and password, or IP address dependent logins, which limits access to your account from anywhere outside of one particular IP address.</p>
<p>While adding any of these extra safeguards will limit your ability to make easy account change or access your files from remote locations, it may be a worthwhile price to pay.</p>
<p>The post <a href="https://www.techtastic.biz/it-security/dns-hacking-not-a-target-doesnt-mean-youre-safe/">DNS Hacking: Just Because You’re Not a Big Target, Doesn’t Mean You’re Safe</a> appeared first on <a href="https://www.techtastic.biz">TechTastic</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.techtastic.biz/it-security/dns-hacking-not-a-target-doesnt-mean-youre-safe/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5521</post-id>	</item>
		<item>
		<title>Why SMBs Must Proactively Address Threats of Mobile Hacks</title>
		<link>https://www.techtastic.biz/it-security/why-smbs-must-proactively-address-threats-of-mobile-hacks/</link>
					<comments>https://www.techtastic.biz/it-security/why-smbs-must-proactively-address-threats-of-mobile-hacks/#_comments</comments>
		
		<dc:creator><![CDATA[Zion Finck]]></dc:creator>
		<pubDate>Fri, 06 Jul 2018 06:21:38 +0000</pubDate>
				<category><![CDATA[IT Security]]></category>
		<guid isPermaLink="false">http://www.techtastic.biz/?p=507</guid>

					<description><![CDATA[<p>More cyber criminals are targeting small-to-medium sized businesses so you must proactively address threats of mobile hacks. One reason for this is too many workplaces have insufficient bring-your-own-device (BYOD) policies in place. Some have none at all. Although firms are generally more knowledgeable about network security risks than in years past, they still woefully underestimate&#8230;</p>
<p>The post <a href="https://www.techtastic.biz/it-security/why-smbs-must-proactively-address-threats-of-mobile-hacks/">Why SMBs Must Proactively Address Threats of Mobile Hacks</a> appeared first on <a href="https://www.techtastic.biz">TechTastic</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="mainContainer" style="height: 100%; width: 100%;">
<div><span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;">More cyber criminals are targeting small-to-medium sized businesses so you must proactively address threats of mobile hacks. One reason for this is too many workplaces have insufficient bring-your-own-device (BYOD) policies in place. Some have none at all. Although firms are generally more knowledgeable about network security risks than in years past, they still woefully underestimate the security vulnerabilities linked to mobile devices like smartphones and tablets.</span></div>
</div>
<p>This is a real cause for concern since data breaches have the ability to put many already financially challenged SMBs out of business. If customer/client data has been breached, there could be potential litigation costs, and naturally, lost goodwill and an irreparable hit to brand or company reputation.</p>
<h2>Don’t Just Say You’re Worried About the Bad Guys&#8230; Deal With Them</h2>
<p>SMBs say they view network security as a major priority but their inaction when it comes to mobile devices paints a different picture. A recent study found that only 16% of SMBs have a mobility policy in place.</p>
<p>Despite the fact that stolen devices are a major problem in today’s mobile workforce, only 37% of mobility policies enforced today have a clear protocol outlined for lost devices. Even more troubling is the fact that those firms who have implemented mobility policies have initiated plans with some very obvious flaws.</p>
<p>Key components of a mobility policy such as personal device use, public Wi-Fi accessibility, and data transmission and storage are often omitted from many policies. Thankfully, most SMB cybercrimes can be avoided with a comprehensive mobility policy and the help of mobile endpoint mobile device management services.</p>
<h2>A Mobility Policy Is All About Acceptable/Unacceptable Behaviors</h2>
<p>Your initial mobility policy doesn’t have to be all encompassing. There should be room for modifications, as things will evolve over time. Start small by laying some basic usage ground rules, defining acceptable devices and protocols for setting passwords for devices and downloading third-party apps. Define what data belongs to the company and how it’s to be edited, saved, and shared. Be sure to enforce these policies and detail the repercussions for abuse.</p>
<h2>Features of Mobile Device Management Services</h2>
<p>MDM services are available at an affordable cost. These services help IT managers identify and monitor the mobile devices accessing their network. This centralized management makes it easier to get each device configured for business access to securely share and update documents and content. MDM services proactively secure mobile devices by:</p>
<ul>
<li>Specifying password policy and enforcing encryption settings</li>
<li>Detecting and restricting tampered devices</li>
<li>Remotely locating, locking, and wiping out lost or stolen devices</li>
<li>Removing corporate data from any system while leaving personal data intact</li>
<li>Enabling real time diagnosis/resolution of device, user, or app issues</li>
<li>It’s important to realize that no one is immune to cybercrime. The ability to identify and combat imminent threats is critical and SMBs must be proactive in implementing solid practices that accomplish just that.</li>
</ul>
<p>The post <a href="https://www.techtastic.biz/it-security/why-smbs-must-proactively-address-threats-of-mobile-hacks/">Why SMBs Must Proactively Address Threats of Mobile Hacks</a> appeared first on <a href="https://www.techtastic.biz">TechTastic</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.techtastic.biz/it-security/why-smbs-must-proactively-address-threats-of-mobile-hacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">507</post-id>	</item>
		<item>
		<title>Is your Business Safe from Virtual Threats?</title>
		<link>https://www.techtastic.biz/it-security/is-your-business-safe-from-virtual-threats/</link>
					<comments>https://www.techtastic.biz/it-security/is-your-business-safe-from-virtual-threats/#_comments</comments>
		
		<dc:creator><![CDATA[Zion Finck]]></dc:creator>
		<pubDate>Thu, 08 Feb 2018 16:17:50 +0000</pubDate>
				<category><![CDATA[IT Management]]></category>
		<category><![CDATA[IT Security]]></category>
		<guid isPermaLink="false">http://www.techtastic.biz/?p=465</guid>

					<description><![CDATA[<p>Did you know that 50% of small business owners think their businesses are too small to be targeted by the thieves of the virtual world? Contrary to popular belief, 72% of hacker attacks often happen to smaller firms – firms with less than 100 employees! So how prepared is your SMB? Here’s a checklist to&#8230;</p>
<p>The post <a href="https://www.techtastic.biz/it-security/is-your-business-safe-from-virtual-threats/">Is your Business Safe from Virtual Threats?</a> appeared first on <a href="https://www.techtastic.biz">TechTastic</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Did you know that 50% of small business owners think their businesses are too small to be targeted by the thieves of the virtual world? Contrary to popular belief, 72% of hacker attacks often happen to smaller firms – firms with less than 100 employees! So how prepared is your SMB? Here’s a checklist to help you find out how vulnerable you are to these attacks.</p>
<h2>1. Do you have Antivirus protection?</h2>
<p>An antivirus software program can protect you from threats that originate from emails such as phishing and virus attacks. However, the most striking fact is that 61% of small businesses don’t install any antivirus software! If you are one of them, then it’s time to change!</p>
<h2>2. How sturdy is your Firewall?</h2>
<p>A good firewall system protects your computers from the variety of threats that exist in the virtual world. Examples include harmful cookies, viruses, worms and other such malicious programs used by hackers.</p>
<h2>3. Do you use a Spam filter?</h2>
<p>Using a simple spam filter for your emails keeps junk out of your inbox. The bonus to having a good spam filter is that your employees save time, as they are not distracted by irrelevant emails, but the major perk here is that the potential virus and phishing threats are lessened as spam emails are unlikely to be opened.</p>
<h2>4. Do you do backup your data regularly?</h2>
<p>Agreed – backups don’t really protect your data, but they are the only way to recover it if data loss does happen. So, be sure you have a regular and reliable backup plan in place – and it is actually being deployed.</p>
<p>Data loss can prove very costly—especially to SMBs, sometimes even resulting in them having to close down. Prevention is certainly better than a cure in such cases.</p>
<p>The post <a href="https://www.techtastic.biz/it-security/is-your-business-safe-from-virtual-threats/">Is your Business Safe from Virtual Threats?</a> appeared first on <a href="https://www.techtastic.biz">TechTastic</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.techtastic.biz/it-security/is-your-business-safe-from-virtual-threats/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5282</post-id>	</item>
		<item>
		<title>Is That Email a Phishing Scheme?</title>
		<link>https://www.techtastic.biz/email-security/is-that-email-a-phishing-scheme/</link>
					<comments>https://www.techtastic.biz/email-security/is-that-email-a-phishing-scheme/#_comments</comments>
		
		<dc:creator><![CDATA[Zion Finck]]></dc:creator>
		<pubDate>Thu, 01 Feb 2018 16:16:09 +0000</pubDate>
				<category><![CDATA[Email Security]]></category>
		<category><![CDATA[IT Security]]></category>
		<guid isPermaLink="false">http://www.techtastic.biz/?p=463</guid>

					<description><![CDATA[<p>Research has revealed that over half of all users end up opening fraudulent emails and often even fall for them. Phishing is done with the aim of gathering personal information about you, generally related to your finances. The most common reason for the large number of people falling for fraudulent emails is that the phishing&#8230;</p>
<p>The post <a href="https://www.techtastic.biz/email-security/is-that-email-a-phishing-scheme/">Is That Email a Phishing Scheme?</a> appeared first on <a href="https://www.techtastic.biz">TechTastic</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Research has revealed that over half of all users end up opening fraudulent emails and often even fall for them. Phishing is done with the aim of gathering personal information about you, generally related to your finances. The most common reason for the large number of people falling for fraudulent emails is that the phishing attempts are often so well-disguised that they escape the eyes of a busy email reader. Here are a few tips that help you identify whether that email really came from your bank or is another attempt at defrauding you…</p>
<h2>1. They are asking for personal information</h2>
<p>Remember, no bank or financial institution asks you to share your key personal information via email, or even phone. So, if you get an email where they ask for your ATM PIN or your e-banking password, something’s a miss.</p>
<h2>2. The links seem to be fake</h2>
<p>Phishing emails always contain links that you are asked to click on. You should verify if the links are genuine. Here are a few things to look for when doing that:</p>
<h3 style="padding-left: 30px;">Spelling</h3>
<p style="padding-left: 30px;">Check for the misspellings in the URL. For example, if your bank’s web address is www.bankofamerica.com, a phishing scheme email could misspell it as www.bankofamarica.com or www.bankofamerica-verification.com</p>
<h3 style="padding-left: 30px;">Disguised URLs</h3>
<p style="padding-left: 30px;">Sometimes, URLs can be disguised…meaning, while they look genuine, they ultimately redirect you to some fraudulent site.</p>
<p style="padding-left: 30px;">You can recognize the actual URL upon a mouseover, or by right clicking on the URL, and selecting the ‘copy hyperlink’ option and pasting the hyperlink on a notepad file. But, NEVER ever, paste the hyperlink directly into your web browser.</p>
<h3 style="padding-left: 30px;">URLs with ‘@’ Signs</h3>
<p style="padding-left: 30px;">If you find a URL that has an ‘@’ sign, steer clear of it even if it seems genuine. Browsers ignore URL information that precedes @ sign. That means, the URL www.bankofamerica.com@mysite.net will take you to mysite.net and not to any Bank of America page.</p>
<h2>3. Other tell-tale signs</h2>
<p>Apart from identifying fake URLs, there are other tell-tale signs that help you identify fraudulent emails. Some of these include:</p>
<ul>
<li>Emails where the main message is in the form of an image, which, upon opening, takes you to the malicious URL.</li>
<li>Another sign is an attachment. Never open attachments from unknown sources as they may contain viruses that can harm your computer and network.</li>
<li>The message seems to urge you to do something immediately. Scammers often induce a sense of urgency in their emails and threaten you with consequences if you don’t respond. For example, threat of bank account closure if you don’t verify your ATM PIN or e-banking password.</li>
</ul>
<p>Finally, get a good anti virus/email protection program installed. It can help you by automatically directing spam and junk mail into spam folders and deactivating malicious attachments.</p>
<p>The post <a href="https://www.techtastic.biz/email-security/is-that-email-a-phishing-scheme/">Is That Email a Phishing Scheme?</a> appeared first on <a href="https://www.techtastic.biz">TechTastic</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.techtastic.biz/email-security/is-that-email-a-phishing-scheme/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5281</post-id>	</item>
		<item>
		<title>Five Things You Should Do Right Now to Preserve Your Network and Systems</title>
		<link>https://www.techtastic.biz/it-security/five-things-you-should-do-right-now-to-preserve-your-network-and-systems/</link>
					<comments>https://www.techtastic.biz/it-security/five-things-you-should-do-right-now-to-preserve-your-network-and-systems/#_comments</comments>
		
		<dc:creator><![CDATA[Zion Finck]]></dc:creator>
		<pubDate>Thu, 04 Jan 2018 15:41:47 +0000</pubDate>
				<category><![CDATA[Email Security]]></category>
		<category><![CDATA[IT Security]]></category>
		<guid isPermaLink="false">http://www.techtastic.biz/?p=455</guid>

					<description><![CDATA[<p>1. Backup Files Every Day As catastrophic as data loss is, the number of businesses that still are not backing up their network is unbelievable. According to the Symantec Small to Medium Size Businesses (SMB) data, only 23% of SMBs are backing up their data on a daily basis and fewer than 50% are backing&#8230;</p>
<p>The post <a href="https://www.techtastic.biz/it-security/five-things-you-should-do-right-now-to-preserve-your-network-and-systems/">Five Things You Should Do Right Now to Preserve Your Network and Systems</a> appeared first on <a href="https://www.techtastic.biz">TechTastic</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="mainContainer" style="height: 100%; width: 100%;">
<div>
<h2>1. Backup Files Every Day</h2>
<p>As catastrophic as data loss is, the number of businesses that still are not backing up their network is unbelievable. According to the Symantec Small to Medium Size Businesses (SMB) data, only 23% of SMBs are backing up their data on a daily basis and fewer than 50% are backing up data weekly. Any number of events can result in data loss, so the importance of frequently backing up your network cannot be overstated.</p>
<h2>2. Ensure Backup Procedures Are Checked Regularly</h2>
<p>Many times business owners think that they have a backup system in place only to find out after it’s too late that it hasn’t been working properly. It may seem like your files are being backed up daily, however, the backup could have become corrupt or it is not backing up huge chunks of critical data. Check your backup procedures regularly to ensure they are working properly in order to be sure that ALL of your data can be recovered. In the age of BYOD (Bring-Your-Own-Devices) it is also important to frequently backup data on your employee’s personal laptops, iPads or Blackberrys, so make sure you have a procedure in place to check those backups as well.</p>
<h2>3. Make Sure Updated Virus Protection and Firewalls Are Always Enabled</h2>
<p>Far too many companies either have no virus protection, expired virus software licenses, or disabled virus programs that aren’t running at all. This makes their business technology vulnerable to virus attacks from emails, spam, data downloads, and unreputable websites. Further, because of inadequate firewall protection about 40% of small to medium businesses will have their network accessed by a hacker. Chances are, when these businesses are attacked they will be entirely unaware it is happening. In order to protect your valuable data and assets, ensure your virus protection is adequate, up-to-date and functioning properly and that your firewall is intact. Finally, don’t forget to update security patches and change passwords when an employee leaves in order to deter hacking attempts.</p>
<h2>4. Monitor Server Drives</h2>
<p>Dangerously full server drives can bring their own set of problems – ranging from program and server crashes to sluggish email delivery. Proactive monitoring and maintenance of your server can spare your business a lot of problems down the road.</p>
<h2>5. Regularly Check Critical Built-In Logs</h2>
<p>Very few problems with technology emerge suddenly. These problems typically progress over time and evolve into more serious problems. Frequently review your critical built-in log files to help identify the problem before it has gotten out of control and wreaks havoc on your business infrastructure.</p>
</div>
</div>
<p>The post <a href="https://www.techtastic.biz/it-security/five-things-you-should-do-right-now-to-preserve-your-network-and-systems/">Five Things You Should Do Right Now to Preserve Your Network and Systems</a> appeared first on <a href="https://www.techtastic.biz">TechTastic</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.techtastic.biz/it-security/five-things-you-should-do-right-now-to-preserve-your-network-and-systems/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">455</post-id>	</item>
	</channel>
</rss>
