- MANAGED SERVICES
- Elevity Managed IT
- imageCare Managed Print
- AI Solutions
- Enterprise Content Management
- WHO WE ARE
Toll Free: 800.333.5905
2675 Research Park Drive
Madison, WI 53711
Just like football, cybersecurity is a team sport. An IT department can’t protect your company’s network alone. Every employee is on the line of scrimmage – and must prevent cyberattacks from trying to break through. Get in the game with these essential cybersecurity tips.
Did you know that 91% of cyberattacks start with a phishing email? Phishing emails use many different tactics, but their end goal is the same – to trick you into revealing your password, username, or other sensitive information.
If you answered yes to these questions, you could be looking at a phishing email. Whenever you find a sketchy email in your inbox, don’t respond and alert your IT person.
We all know we’re supposed to use strong passwords, yet so many of us still don’t. But if there was ever a time to get serious about your passwords, this is it.
More than 60% of passwords are weak, default, or stolen. Weak or stolen passwords cause 81% of data breaches. So strong passwords are more essential than ever.
Let’s break down how to create uncrackable passwords – and how to organize all the unique passwords you need for your various accounts.
First, some dos and don’ts:
Here are 3 methods for creating tough-to-guess passwords – the passphrase strategy, the sentence strategy, and the PAO method.
A passphrase strings together multiple words into one long password. Think “mountainstaplebatteryhorse.” Visualize a scene in your mind that includes atleast 4 unrelated words – perhaps “snowteargazebocover.” Anytime you need to remember your passphrase, picture the image in your mind. This type of password is much easier to remember than a complex collection of upper and lower cases letters, symbols, and numbers.
Think of a personal or memorable sentence. Then take the words from that sentence and abbreviate and combine them in unique ways.
This is the Person-Action-Object (PAO) method. Start by picturing an interesting place (Mount Rushmore). Next, think of a familiar or famous person (Beyonce). Then imagine a random action and random object (Beyonce driving a Jello mold at Mount Rushmore). The weirder the better. Our brains are better at remembering outlandish, unusual scenarios.
Take the first 3 letters from “driving” and “Jello” to create “driJel.” Repeat these same steps for three more stories. Finally combine your made-up words together, and you'll have an 18-character password that'll be familiar to you but seem completely random to other people.
We’re all using our home WiFi a lot more now that we’re working remote. Hackers know this and are on the prowl for WiFi routers that aren’t well protected. Here’s how to secure your home WiFi:
One last note. Turn off Alexa, Google home, and other smart home assistants while you’re working. Why? Because they’re on the same network you’re using for work and can be hacked and used to spy on you.
We get it – pausing your day to apply an update is kind of a pain. But updates are important and need to be applied as soon as possible when they become available. These patches and updates fix bugs and security holes that the bad guys can use to get into your applications and network.
Always keep your WiFi router, phones, Internet of Things devices, computer operating system, and applications updated. Check for new updates often and don’t put off installing them.
Challenging times like these often bring an uptick in cybersecurity threats. Just because you’re working from the comfort of your home doesn’t mean you should relax when it comes to protecting yourself and your company.
Don’t be afraid to reach out to your company’s IT professional if you need help or have questions about being cybersecure. Stay vigilant and stay safe.