Ed Lukacs Ed Lukacs

Why Passwords Can Be Your Business’s Weakest Point

In today's digital world, safeguarding your organization's online assets is critical. Unfortunately, poor password hygiene practices by some employees cause problems for many small businesses, leaving them vulnerable to hackers.

Cybercriminals are constantly trying to find new ways to break into business systems. Sadly, too often, they succeed thanks to weak passwords. In fact, nearly 50% of cyberattacks last year involved weak or stolen passwords.* This calls for small businesses like yours to step up and take password security seriously and implement strong password policies.

Password best practices

When your team is aware of password best practices, they can significantly ramp up your cybersecurity.

Use a password manager

One of the most important things to keep your passwords safe is to use a password manager. A password manager helps you create and store strong passwords for all your online accounts. Password managers can also help you keep track of your passwords and ensure they are unique for each account.

Implement single sign-on (SSO)

Single sign-on is a popular password solution that allows users to access multiple applications with one set of credentials. This means that you only need to remember one password to access all your online accounts.

While SSO is a convenient solution, remember that all your accounts are only as secure as your SSO password. So, if you're using SSO, make a strong, unique password that you don't use for anything else.

Avoid reusing passwords on multiple accounts

If a hacker gains access to one of your accounts, they will try to use that same password to access your other accounts. By having different passwords for different accounts, you can limit the damage that a hacker can cause.

However, avoid jotting down your passwords on a piece of paper and instead depend on a safe solution like using a reliable password manager.

Make use of multi-factor authentication (MFA)

One of the best ways to protect your online accounts is to use multi-factor authentication (MFA). In addition to your password, MFA requires you to enter a code from your phone or another device. Even if someone knows your password, this method makes it much more difficult for them to compromise your account.

While MFA is not perfect, it is a robust security measure that can assist in the protection of your online accounts. We recommend that you begin using MFA if you haven't already. If you use MFA, make sure each account has a strong and unique code.

Don’t use the information available on your social media

Many people use social media to connect with friends and family, stay up to date on current events, or share their thoughts and experiences with others. However, social media can also be a source of valuable personal information for criminals.

When creating passwords, you must avoid using information easily obtainable on your social media accounts. This includes your name, birth date, and other details that could be used to guess your password. Taking this precaution can help keep your accounts safe and secure.

An IT service provider can help you

As cyberattacks become more sophisticated, you may not be able to devote sufficient time and effort to combat them. As an IT service provider, we can help implement a Password Manager, ensure that password policies are in place to ensure strong passwords and consult with you on other ways to help keep you and your business safe. We also partner with market-leading 1Password to help businesses set up and maintain their password vaults.

Schedule a no-obligation consultation with us today to learn more about how we can help protect you from poor password hygiene, and how we can help set you and your business up with 1Password.

Now that you know how to keep your passwords safe, download our infographic by clicking here to learn how to keep your email inbox safe.

Source:

* Verizon DBIR 2022

Read More
Ed Lukacs Ed Lukacs

Busting Four Popular Cybersecurity Myths

Cybersecurity is a difficult subject. Here we talk about 4 common myths in Cybersecurity.

As the business world becomes increasingly digitized, you’ll have to tackle several dangers that come with doing business online. Cybercriminals nowadays have several methods to target organizations, from credential hacks to sophisticated ransomware attacks.

This is why it’s critical to think about measures to protect your organization in every possible way. If you are unfamiliar with technology and the cyber threat landscape, it might be hard to know the best strategy to protect your organization. With so much noise about cybersecurity, it can be challenging to distinguish between myth and fact. 

Understanding current and evolving technology risks, as well as the truths behind them, is critical for providing a secure direction for your business. This blog can help you with that, and after reading it, you'll have a better idea of the threat landscape and how to protect your business against it.

Cybersecurity myths debunked

Busting the top cybersecurity myths is essential to keep your business safe:

Myth #1: Cybersecurity is just one solution

There are many different aspects to cybersecurity and they’re all crucial in keeping your business safe. A robust cybersecurity posture includes several layers of defense, including employee security awareness training, physical security measures, and several layers of defenses for your network and devices. You can create a solid cybersecurity strategy for your business by considering all these measures.

Myth #2: Only large businesses become the victims of cyberattacks

Small businesses are typically not going to be targeted with sophisticated personalized attacks that you read about on the news, however, small businesses are still a big target for cybercrime. Often small businesses won’t have the resources to implement enterprise-grade tools and won’t be able to employ a team of security specialists to monitor everything happening on their network and assets, which can make them low-hanging fruit for compromise.

Myth #3: Antivirus software is enough protection

Antivirus tools only protect one dimension of security and are far from a complete solution. Only implementing antivirus software without a more complete security posture would be similar to only locking one door on a house and expecting the whole house to be secure.

Myth #4: I'm not responsible for cybersecurity

Your IT team can help implement the right tools and policies for cyber security, however, everyone in the organization needs to be involved in protecting your business from outside threats. Compromises are getting more sophisticated every day, and your employees need to be aware of what to look for in suspicious emails, downloads, or even social engineering calls. The best way to have an effective cybersecurity program is to have everyone involved.

An IT service provider can help

Cybersecurity is a critical part of any modern business, and it can be intimidating to see how much is involved in protecting your business. This is where an IT service provider, like us, can help.

We have the experience and expertise to handle matters such as cybersecurity, backup, compliance, and much more for our customers. We're always up to date on the latest security landscape and provide you with the tools and guidance you need to stay safe. Contact us today to learn more about how we can help you secure your business.


Want to learn more? Get our eBook that highlights the importance of security awareness training in your cybersecurity strategy. Download it here.

Read More
Robby Barnes Robby Barnes

Reduce CAPTCHAs with iOS 16

One of the underrated features that launched with iOS 16 is the release of a new technology called Private Access Tokens. This is a new method for verifying the identity of a device from the internet in a secure and private way. This means websites don’t need to throw CAPTCHA challenges if they support this to try to determine if traffic is legitimate or bot-generated.

To ensure this is enabled, you can go to Settings > Apple ID > Password & Security > Automatic Verification. It should be enabled by default.

Cloudflare, one of our partners, is one of the companies that helped design and implement this technology. Read more details about it on their blog post here - How to enable Private Access Tokens in iOS 16 and stop seeing CAPTCHAs

Read More
Robby Barnes Robby Barnes

Google Drive Quicksearch

Recently I found out that if you have the Google Drive Desktop app installed on Mac, you can invoke a quick search function that works much like Spotlight, but for your Google Drive data. I don’t know what this feature is actually called. It’s likely not quick search, but I also didn’t have anything else to call it.

If you have it installed and signed in, simply press command + option + G and it pulls up a search box.

It’s worth noting that in more recent versions of Drive Desktop, you can directly enable Spotlight indexing as well in the preferences, however I’ve had mixed luck with how well it works, and honestly for me if I’m searching for something in Drive, I know it’s there and I like having the mental separation between the two.

Read More
Ed Lukacs Ed Lukacs

How to Build Trust Using Technology

To make the most of your technology to build trust with customers, employees, and other stakeholders, here are some of the most effective areas to focus on.

To make the most of your technology to build trust with customers, employees, and other stakeholders, here are some of the most effective areas to focus on:

REPUTATION

Are you using technology from well-known and trusted vendors? Using technology that is already known and trusted in the marketplace can help you build a trustworthy reputation. Borrow from their trustworthiness to boost your own.

SECURITY

Organizational data breaches have become increasingly common in recent years, with world events making the situation worse. Protecting customer and employee data is critical to building trust. Make sure you have effective measures in place to keep sensitive information secure.

USER EXPERIENCE

Technology and processes can be harnessed to create trust-building foundations among employees, customers, and partners. For example, integrating technologies can save time and serve as a reliable foundation. Inefficient or incompatible technologies can create friction and confusion, damaging productivity. If you take the time to select and integrate the right technologies, it can make a big difference.

Similarly, thoughtful processes that consider the user experience can reduce confusion and friction and make it easier for employees to work with you.

BACKUPS, DISASTER RECOVERY, AND INCIDENT RESPONSE

It is more important than ever to ensure that your business-critical data is backed up.  Companies are relying on cloud services more than ever, which can definitely help with the resiliency of your data, but there are still scenarios where that data could be lost, damaged, or encrypted by ransomware.  We can help you determine which data is the most critical to your business, where it lives, and the best way to back up that data.  We work with you and your business needs to design a disaster recovery plan that meets the specific needs of you and your business.

COMPLIANCE

Is your business compliant with data privacy regulations? Before assuming you are, make sure with a solid foundation (like the National Institute of Standards and Technology Cybersecurity Framework or NIST CSF) and routine reporting that measures compliance. Protecting customer data is a great way to build trust.

FLEXIBILITY

Remote and hybrid work has become more and more popular over the last several years and is a trend that isn’t going anywhere any time soon. Offering employees the flexibility to work from different locations is a great way to build trust and loyalty with your organization - which can, in turn, improve the customer experience. However, you’ll need to make sure you have the necessary technologies in place to ensure that employees can work safely and provide top-notch service remotely.

Partner for success

Trust-building technology can be difficult for SMBs to handle on their own, but collaborating with an MSP like us can offload the heavy lifting. We can help with tasks like disaster recovery, compliance, security, and much more. We work as a partner with you so that you can concentrate on your day-to-day operations and big-picture business goals, safe in the knowledge that your customers' data is protected.

Interested in learning more about how we can help?

Read More
Ed Lukacs Ed Lukacs

The Case for Trust-Building as a Small Business

Building trust is important, and it’s not something that only enterprise companies need to worry about. Here are some ideas on building trust as a small business.

There is a strong connection between trust and prosperity. In fact, when trust levels are high, businesses tend to grow faster. According to McKinsey and Company, Harvard Business Review, Forrester Research, and many other reputable organizations, trust is the connecting fabric upon which innovation and business success are built.

You might think that trust-building isn't crucial for small to medium-sized businesses (SMBs), but it is critical if you want to achieve your business objectives and keep your employees and customers satisfied. While you might not expect a technology company like ours to discuss trust, we care about your business objectives and believe it is essential for your people, processes, and technology.

Building trust is essential for any organization, whether it's a startup or a Fortune 500 company. It gives employees the confidence to take chances and innovate, gives customers the confidence to buy from and collaborate with you, and gives partners the confidence to do business with you. But how do you create a foundation for trust?

Leverage processes and technology

Building trust is not easy, and it often takes time and effort to develop. Luckily, there are a few things companies can do to succeed.

INTEGRATE TECHNOLOGIES

Technology integration is one of the most important considerations for businesses today. Not only do neatly integrated technologies save time and serve as a reliable foundation, but they can also reduce friction within your company. Inefficient or incompatible technologies can create chaos and confusion, slowing down workflows and damaging productivity. 

If you take the time to select and integrate the right technologies, it can make all the difference in terms of organizational efficiency and success.

DEPLOY THOUGHTFUL PROCESSES

Thoughtful processes that consider the user experience can reduce confusion and opportunities for conflict and make it easier for employees to work for you. Friction arises when an individual’s expectations do not match the actual experience. When this occurs, it can lead to conflict as people attempt to shift responsibility or blame. 

Thoughtful processes can help ensure that everyone’s expectations are met, minimizing the chances of a conflict.

SECURE DATA

When it comes to organizational data breaches, customers and employees are quick to lose trust in companies that can’t protect their sensitive data. Implementing measures to secure your customer and employee data is one way to help rebuild trust. In doing so, you are not only protecting your customers and employees, but also your bottom line.

Every day there are headlines about breaches of different companies and organizations, and the trend is only accelerating.  It’s more important than ever to ensure you are taking the appropriate steps to protect your company and customer data.

Choose the right partner

Since trust-building can be so challenging for SMBs to handle alone, collaborating with a managed service provider (MSP) like 2Fifteen is extremely beneficial. MSPs can help with tasks such as disaster recovery, compliance, security, and much more. Working with an MSP such as us will allow you to concentrate on your core competencies, safe in the knowledge that your company and customer data is protected.

Interested in learning more about how we can help?  Contact us for more information

Read More
Robby Barnes Robby Barnes

Improved email notifications for Google Calendar invites

Over the next 2 weeks, Google will be rolling out a new layout for email calendar invitations that will provide a better view of the event, meeting information, guests, and more. Additionally, Google is adding some clarity when someone changes a calendar event, where it will more clearly call out what specifically changed.

For more information read this post on the Google Workspace Updates blog.

Read More