By Dan Baldwin, Editor
951-251-5155 email
My brother who lives in Alaska says that he and all his neighbors never lose their car keys because they always leave the keys in the ignition of the car.
When I asked my brother if that practice doesn't lead to an increase in car theft he said, "No because everyone in Alaska also owns a lot of guns - and we know how to shoot them at car thieves".
Well, think what you will of Sarah Palin, but I for one would not try to steal her car out of her driveway or the cars of any of her neighbors because I'm convinced they have a credible security system in place.
Does your business have a credible security plan in place to prevent cyber thieves from snooping around your digital asset "business driveway" to see what unprotected information you have lying around that's just begging to be stolen or corrupted so your employees or customers can't use it?
Take a minute to watch the small business data security and protection video below provided by CenturyLink for a few useful tips. After that call your local telecom agent or independent telecom carrier sales partner to schedule a digital asset security audit of your business.
Let an Independent Telecom Carrier Partner Help You With a Data Security Check
As an experienced telecom agent and an independent telecom network services sales partner we help our clients conduct security audits of their digital assets to confirm that they are properly protected or confirm that vulnerabilities exist.
In the past, a significant investment in "on-premises" data security hardware and software was required to protect corporate information. Today however, as more businesses migrate their information off-premises" and into more secure public or private "clouds", much more comprehensive data security is available to even the smallest of businesses at a fraction of the price that would have been paid to protect the same assets in the past.
Give us a call so we can share with you the benefit of our data security experience.
CenturyLink Small Business Tech Tips Video: Protect Your Business
Video Transcript:
Your digital assets are as valuable to your business as your physical ones. Losses due to security threats are extremely costly and can even prevent you from running your business. Every year over 100 million records containing personal information are lost or stolen, and data collection is now the fastest growing cause of all business interruptions.
In a recent study conducted by Symantec nearly 1/3 of all small businesses are not using even basic anti-virus protection, almost half don't backup their desktop PCs, and 59% have no endpoint protection.
So what technologies do you need to keep your business safe?
- List all your information systems and devices to make sure you have security in place. Just because an intrusion hasn't happened does not mean it won't. Half of all technology users have experienced some form of security threat. Hardware failure, natural disaster, power outages, viral intrusion and theft can all get expensive, and you can lose a lot of productivity.
Data backup is a great way to protect your data. By copying it to secure devices at your location or online, it assures your information will be safe from intrusion or a natural disaster, and you can back up your data manually or with automatic systems that work after hours. Most data backup systems include recovery. - Information that is valuable to you is also valuable to a thief. Data you own on customers, inventory, employees, vendors and operations is just as important as the physical investment you make in your equipment. Networks and e-mail firewalls prevent unauthorized access, and security passwords should be carefully created and changed regularly.
Encryption software effectively scrambles vital content on storage devices or an e-mail for descrambling later by authorized persons using a decoding key. Everything is performed by the software so usually all you will need to do is input a password. Both measures may take some effort to implement and work with but in the end you save your business from potential hazards. - Consider all the vulnerabilities because it only takes one weak link. Anything that can be accessed using a mobile device or using Wi-Fi portals can be at risk including web sites, Internet e-mail, accounting, inventory, manufacturing, and vendor data. Even a credit card reader can be compromised and all your transactions can be lost.
Make sure security and redundancy is in place at every point of entry. Web hosting has to be reliable and secure. Anti-virus, ani-spyware and anti-spam software can all help monitor your entire internal network and protect against unwanted activity. - Not all theft is electronic. Security cameras with central monitoring enable you to monitor multiple physical locations in realtime. It's easy. You just need an Internet connection and cameras.
- List all systems and data backup plans and run a test to make sure they are working.
- Consider firewalls and/or encryption software to prevent unauthorized access.
- For web protection, make sure your web hosting is secure and you have anti-virus and anti-spam software in place.
- Don't forget the security of your physical business location.
This content is copyright protected. To license this content for your own website please contact Dan Baldwin at [email protected]. Photo credit: iStockPhoto.com #8934156, Keywords: digital assets, security threats, personal information, data collection, business interruption, Symantec, small business, anti-virus protection, desktop PC, backup, endpoint protection, information systems, intrusion, security threat, hardware failure, natural disaster, power outage, viral intrusion, theft, productivity, data backup, secure device, recovery, networks, e-mail firewall, unauthorized access, security passwords, encryption software, storage devices, decoding key, mobile device, wifi portal, Internet, security, redundancy, point of entry, anti-virus, anti-spyware, anti-spam, security camera, security checklist, Sarah Palin, guns, telecom agent, independent telecom carrier sales partner, security audit, private, public, cloud,
Recent Comments