Data security and privacy should be every small business owner’s top priority in this day when cyber-criminals are on the loose. The good news is you don’t have to be a tech genius to make it happen. Here are practical ways to shield your company from cyber-attacks.
Cover your webcam
If Facebook founder Mark Zuckerberg, former FBI Director James Comey, and National Security Agency whistleblower Edward Snowden all believe their webcams could be compromised, there’s no reason you should feel safe. They’re not overreacting because of some ruthless paparazzi that’s hounding them. It’s a fact that cyber-criminals can use your webcam to spy on you.
Though it might sound like a scene from an action movie or crime thriller, this has actually happened on several occasions. Hackers do this either to satisfy their voyeuristic tendencies or, more commonly, to steal personal information. This is a very real threat with disturbing repercussions.
With your webcam, cyber-criminals can examine your surroundings, determine your location, as well as spy on the people you’re with. They can use this information to hold you ransom and threaten to broadcast your most intimate and vulnerable moments if you don’t pay up.
Fortunately, guarding yourself against this danger is easy. Covering your webcam should do the trick. You can use regular tape or you can purchase a cheap webcam cover online.
Use a privacy shield
Think of privacy guards as those iPhone screen protectors but with an anti-snooping feature. These are thin covers you put on your computer, laptop, or smartphone screen to limit viewing angles. Once installed, anyone trying to look at your screen from anywhere — except straight-on — sees nothing.
Privacy filters are commonly used to protect work devices that display or contain critical files with sensitive data or confidential information. However, less sensitive, personal devices are still vulnerable to “shoulder surfing” — the act of peeking at someone else’s screen, with or without ill intent. This is the reason we recommend using these protectors on all devices.
Get a physical authentication key
Requiring more than one set of credentials to access sensitive resources has become the standard practice for established online services. With two-factor authentication in place, you can gain access to your account only after you’ve entered an authentication code. This is something that the website sends to your smartphone once you’ve entered your account credentials.
Until recently, two-factor authentication relied mostly on text messages sent to mobile phones. But professionals now realize that phones can be hijacked to redirect text messages. Moreover, authentication codes can be stolen, or users can be tricked into entering these codes via a convincing phishing website.
If you’re looking for authentication services that can’t be hijacked, stolen, or lost, your best bet is a USB or Bluetooth key that you can carry always. This means nobody — not even you — will be able to access your account without the physical key. Talk about ultimate security at your fingertips.
If you need help setting up two-factor authentication or IT security services, contact our experts and have peace of mind.