Business Tips

May 2, 2013 In Business Tips, Management Tips

Have You Been Hacked? How to Minimize Your Risk

Just about every day, we read in the news that another company has been hacked. You might have already been directly affected by the password thefts at LinkedIn last year or Evernote this year. Or you might have had your own social media account, email, website, network, or computer hacked. Worse, many of you have been hacked but don’t even know it.

So how can you minimize the damage and risk of hackers? Here are several tips, some familiar, some not so familiar. As you go through the list, check off the ones you’re already doing and make a list of new ideas to implement to protect your business and personal assets.

Signing Your Life Away

Your signature might look great in a graphic in your email signature line, your website, or your newsletter, but it’s a huge risk. You’re giving away your handwriting, and forgers can easily replicate, master your handwriting, and impersonate you. To reduce identity theft, don’t publish your real signature anywhere.

Money, Honey

Implement strong passwords on all of your financial accounts: banks, credit unions, PayPal, credit cards, and your accounting system. We know it’s painful, but do not use the same password for your financial accounts anywhere else, especially social media! If possible, use a different password for each account to reduce risk further.

What’s Your Password?

Here are some quick password tips:

• Do not use your name, your pet’s names or your kid’s names in your passwords. There’s just too much information available publicly to do that safely anymore.
• Mix up letters, numbers, capital letters, and special characters, if they are allowed.
• The longer, the more secure; most apps require at least 8 digits.
• Change passwords quarterly to be on the safe side.

Password Storage

Most apps that help you save time with passwords are NOT safe! Here’s what we do and don’t recommend:

DO:

  • Password-protect your computer, even though you don’t have to.
  • Keep a separate file of your passwords on your computer, but DO password-protect that file and make sure it is not shared with anyone on a network. Also name the file something totally unrelated like bio, letter, or goulash recipe; do not name it “passwords.doc!”
  • You can also keep a record of your passwords offline, but be sure to lock it up in a safe.
  • When you make file and disk backups, be sure those are locked up and password-protected too. They will no longer have your PC password to protect them.

DON’T

  • Don’t give in to your browser or any website when it asks to remember your user ID and password, especially for your financial accounts or client information. All of the major browsers have been hacked – Internet Explorer, Chrome, Firefox, and even Safari.

If you use password management applications, proceed with caution. Be sure you have properly vetted their security claims. Most of these are simply form fillers that are not safe.

Vulnerable Applications

Avoid leaving vulnerable PC ports open and unattended, including chat, messaging, FTP (file transfer protocol), Skype, webinars, Google hangouts, video sharing, and the like. It’s like having all the doors and windows unlocked in your house; an intruder has a lot of choices for easy entry. When you are on these more vulnerable connections, shut the others down, and close the applications you don’t need. Then logoff when you are done.

A Plug for Software

As soon as a hacker has found a new exploit, the software companies will learn about it and make an update available within days. The hacker community is tight; other hackers will look for software that is not updated and exploit the hack. Avoid the copycat hackers by staying on top of your software updates, not just your anti-virus, but also your Microsoft and other software updates. Doing this will eliminate a great deal of the risk out there.

New Users

If multiple team members need to access your software, consider setting up additional users rather than having one account. If one person gets hacked, the others will likely still have access and can react quicker to the intrusion.

Stay Safe Out There

How many of these are you already doing? Give yourself a reward, and then get busy implementing the rest so you can stay safe.

Monthly Archives

Categories

  • Accounting (33)
  • Bookkeeping Tips (16)
  • Business Development (47)
  • Business Tips (85)
  • Cloud Accounting (2)
  • Cool Tech Tools (6)
  • Cost-Savings Tips (16)
  • Customer Service Tips (11)
  • Decision-Making Tips (5)
  • Expense Reduction Tips (7)
  • Management Tips (40)
  • Payroll Tips (5)
  • Profitability Tips (20)
  • QuickBooks Help (2)
  • QuickBooks Software (2)
  • QuickBooks Training (1)
  • Social Media (4)
  • Tax (1)
  • Time Management Tips (16)

6965 El Camino Real #105 PMB 683, Carlsbad, CA 92009 | 408-550-4325 | support@sandismith.com

Copyright Sandra L. Leyva, Inc. 2020 | Legal | Privacy | Cookies

We use cookies to offer you a better browsing experience, analyze site traffic, personalize content, and serve targeted advertisements. By clicking on or navigating the site, you consent to our use of cookies. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.