Computers Need Heroes, Too by Carrie Braaten, Technology Solutions Manager at Gordian Networks
A shadowy, hulking creature crawls out of the dark, stealthily
settings. These settings are your company’s first defense to prevent
sneaking up to an unsuspecting business building to steal the
the spread of contagious viruses throughout your network.
company’s secrets and valuable, one-of-a-kind serums, but then …
Phishing Emails and Websites: Employees see suspicious
It’s a bird, it’s a plane, its Superman! Superman has come to save
emails each day that are obviously spam, but what about the one
the day! He defeats the enemy, and the company’s secrets are safe
from their supervisor that asks for personal information to conduct
for another day.
important business? Teach your employees to check the validity of
The days of tangible, evil masterminds creeping into buildings
emails with their supervisor before divulging personal information. It
being the main safety concern of business owners are in the past.
is also important to check if an email link is valid by hovering over it
Hackers are invisible, disguising themselves as legitimate websites
before clicking. One letter can mean the difference between a good
and emails. They creep through Wi-Fi radio streams and cabling to
site and dangerous one.
find and steal intellectual property or the next great idea that could bring your company success. Where is your computer’s superhero? How does your company
Multi Factor Authentication: Even with all the above precautions, cyber criminals can still trick cautious users. Multi-factor authentication requires an additional security measure, such as a pin
protect its information while allowing employees to access and share necessary information? These five strategies will equip your company with the basic protection it needs for today’s cybersecurity. Password Complexity: It takes only 4.5 seconds to crack your six-character password. Instead, create passwords that are at least 10 characters long, including numbers and symbols. These can take up to five years to crack. Updates: “An update is ready to be installed.” Seeing this message pop up on their screen typically fills employees with dread.
code, fingerprint or facial recognition, to log in. This extra step can
It is tempting to put off impending updates since it takes precious
mean the difference in protecting your company from online threats.
work time. Don’t fall into the temptation. New threats are discovered
your business instead of worrying about your network? Gordian
from the most recent types of threats.
Networks can save the day! We set up each company’s technology
Firewalls and Anti-Virus Settings: When was the last time
with the right balance of security and open communication while
you looked at your firewall settings? What ports are open to public
keeping your business running smoothly even if disaster strikes.
access? Strike the appropriate balance of open communication
Because Computers Need Heroes, Too! gordiannetworks.com
to conduct business and security with both firewall and anti-virus
2
Still worried about cybersecurity? Want to spend your time growing
daily and updates with protective patches keep your computers safe