In Business Magazine June 2019

Page 46

Computers Need Heroes, Too by Carrie Braaten, Technology Solutions Manager at Gordian Networks

A shadowy, hulking creature crawls out of the dark, stealthily

settings. These settings are your company’s first defense to prevent

sneaking up to an unsuspecting business building to steal the

the spread of contagious viruses throughout your network.

company’s secrets and valuable, one-of-a-kind serums, but then …

Phishing Emails and Websites: Employees see suspicious

It’s a bird, it’s a plane, its Superman! Superman has come to save

emails each day that are obviously spam, but what about the one

the day! He defeats the enemy, and the company’s secrets are safe

from their supervisor that asks for personal information to conduct

for another day.

important business? Teach your employees to check the validity of

The days of tangible, evil masterminds creeping into buildings

emails with their supervisor before divulging personal information. It

being the main safety concern of business owners are in the past.

is also important to check if an email link is valid by hovering over it

Hackers are invisible, disguising themselves as legitimate websites

before clicking. One letter can mean the difference between a good

and emails. They creep through Wi-Fi radio streams and cabling to

site and dangerous one.

find and steal intellectual property or the next great idea that could bring your company success. Where is your computer’s superhero? How does your company

Multi Factor Authentication: Even with all the above precautions, cyber criminals can still trick cautious users. Multi-factor authentication requires an additional security measure, such as a pin

protect its information while allowing employees to access and share necessary information? These five strategies will equip your company with the basic protection it needs for today’s cybersecurity. Password Complexity: It takes only 4.5 seconds to crack your six-character password. Instead, create passwords that are at least 10 characters long, including numbers and symbols. These can take up to five years to crack. Updates: “An update is ready to be installed.” Seeing this message pop up on their screen typically fills employees with dread.

code, fingerprint or facial recognition, to log in. This extra step can

It is tempting to put off impending updates since it takes precious

mean the difference in protecting your company from online threats.

work time. Don’t fall into the temptation. New threats are discovered

your business instead of worrying about your network? Gordian

from the most recent types of threats.

Networks can save the day! We set up each company’s technology

Firewalls and Anti-Virus Settings: When was the last time

with the right balance of security and open communication while

you looked at your firewall settings? What ports are open to public

keeping your business running smoothly even if disaster strikes.

access? Strike the appropriate balance of open communication

Because Computers Need Heroes, Too! gordiannetworks.com

to conduct business and security with both firewall and anti-virus

2

Still worried about cybersecurity? Want to spend your time growing

daily and updates with protective patches keep your computers safe


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.