cyber security

Lake Business Products has identified 5 of the top cybersecurity threats for 2020 and what you can do to prevent them. 

Threat 1 – Phishing

Phishing is becoming one of the most common cyberattacks due to the high levels of interaction humans have on electronic communication.

In business offices, Straight Edge Technology sees this becoming even more of a threat as email and IM communication increase.

What should your company do to protect itself from phishing?

First, watch for unusual emails and instant messages.  They may start with unusual wording such as “Dear Customer” instead of using your name, and they often have a generic signature.

Second, be cautious in clicking links or giving sensitive information, even if it appears to be legitimate.  If in doubt, directly contact the source to make sure they sent the message.

And third, install anti-phishing toolbars on internet browsers.  These toolbars alert you to sites containing phishing information.

Threat 2 – Malware & Ransomware

Knowing many companies keep their data on servers connected to the internet, hackers are continually attempting to hack existing IT solutions.

What should your company do to protect itself from malware and ransomware?

First, make sure you keep all your computer software and hardware updated.  Outdated software, drivers, and other plugins are common security vulnerabilities.  If you have an IT service provider, check with them to make sure this is happening on your servers as well.

Second, enable click-to-play plugins that keep Flash or Java from running unless you click a link.  This reduces the risk of running malware programs with Flash or Java.

And third, removing old software, sometimes referred to as Legacy Apps, reduces risk.  For example, if you are running Windows 10, but you run programs designed for Windows 7, then these are Legacy Apps and may be a security risk.  Your software company should be able to give you an updated program designed for Windows 10.

Threat 3 – Database Exposure

Database exposure is what it sounds like:  Due to a security breach, database information is exposed to hacking or theft.

Database exposure occurs in a variety of ways.  Hackers might be able to steal login credentials through social engineering or use malware to gain access.

These databases include customer contact information, financial records, or identity records such as Social Security numbers.

What should your company do to protect itself from database exposure?

First, if you have a private server, keep the physical hardware in a secure and locked room.  This helps prevent theft if your building is robbed, and it keeps unauthorized personnel from accessing it with a portable hard drive.

Second, make sure you have a database firewall and web application firewall.  A locked door protects your physical server and hardware, and firewalls protect your server on the internet.  

Third, keep access to the server limited.  Each person with a login to the server is a potential leak, so the fewer logins the better.

And fourth, encrypt the data on the server and keep a regular backup.

Threat 4 – Credential Stuffing

Credential stuffing is an attack geared toward stealing user access through login credentials.  This is most common in situations where the same login credentials are used for multiple sites or accounts.  

What should your company do to protect itself from credential stuffing?  

First, implement  2-Factor Authentication for account logins.  This requires email or phone verification along with the standard username and password. 

Second, use different passwords for every account and program your employees access.  If one account is hacked, the hacker will not be able to access more accounts with the same password.

And third, never share passwords with other people.  If you have a shared account for some reason, always give the password verbally, never through electronic communication.

Threat 5 – Accidental Sharing

We’ve all seen it happen, and maybe it’s happened to you:  The dreaded “Reply All” to an email when you only meant to reply to one or two people.  Suddenly, everyone in the office knows your true feelings about the manager.

Accidental sharing is a similar problem.  It occurs when information is shared or leaked accidentally, usually as a result of human error, not because of malware or a hacker.  

Accidental sharing includes personal or business data, and it is shared through emails, unsecured forms, messaging or social media platforms, and a host of other ways. 

What should your company do to protect itself from accidental sharing?

First, limit the number of employees who have access to data.  The more people who have access to information, the more likely human error will cause a problem.

And second, implement user activity monitoring software.  This will allow you to track and discover if your data is in danger.  It also provides solutions to prevent accidental sharing.

Network Security Strategy

set2

How effective is your current network security strategy? Are current IT program’s policies, practices, and technologies positioning your organization against current and future network security threats? 

The reality is that there are many cyber security threats for your business and  developing an effective IT security program can be a daunting challenge. Your security program must protect your most important data and systems, while mitigating the most potential and dangerous security threats. In addition, you must accomplish this all at a reasonable cost and with minimal business disruption. Lake Business Products can help!

To learn more, contact sales@lakebusiness.com or 1.800.443.4583.

CONTACT US TODAY TO LEARN MORE!

WHAT OUR CUSTOMERS SAY

 

 

"The Lake County Y has been an extremely satisfied customer of Lake Business Products for many years. We have always found them responsive to service needs and as a non-profit, have appreciated their expertise in structuring a business machine program that helps contain costs. Their role in our philanthropic efforts has also made them an important stakeholder in delivering the Y's mission to our community. Lake Business Products is a great community partner!"

- Dick Bennett, CEO/ Executive Director of the Lake County YMCA

 

“Andrew and his team at Lake Business Products have always been attentive to our needs.  Even though we are a small non-profit with only one copier, Andrew and Lake have always made our needs/requests an important priority.  Our machine works great and we have needed very few service requests.  We especially appreciate the philanthropic support of our mission.  Thank you! 

- Julie A. Moldvay, CPA, Director of Finance

“Lake Business Products has been awarded multiple contracts from West Geauga Local Schools for copiers and printers. Due to their vast knowledge on their equipment and services, they were able to assess our needs and outfit our school system with the appropriate machines, service and usage.

We did an extensive review of several vendors and decided on Lake Business Products because of the complete package of cost, service and reputation. We have been happy with their honesty and integrity. Their service and responsiveness over our multiple locations has been speedy and courteous.”

S. Whelan / Director of Technology, West Geauga Local Schools

“Lake Business Products has been our go-to copier company for over 10 years.  When it came time for us to replace our outdated main office Canon copier, we called LBP.  Whenever we had an issue with the copier, often we would get same-day service from a technician who lives in our community.  He is professional and usually got us up and running again right away.  When it is time to order toner, most often we would have next day delivery.  There are many copier companies out there who would like to sell us a copier, but what happens after the contract is signed is the telltale of a better company.  Lake Business has not disappointed us." 

- Carol Shenker, Simmons Brothers Corporation

“Lake Business is our vendor of choice for copiers and printers. Due to their vast knowledge on their equipment and services, they were able to assess or needs and outfit our company with the appropriate machines, service and usage.

We did an extensive review of several vendors and decided on Lake Business Products because of the complete package of cost, service and reputation. Their honesty and integrity far outweigh their competitors. Although they are a local company, their service and responsiveness over our multiple locations has been exceptional.”

N. Sprutte / DLH Bowles

OUR TECHNOLOGY PARTNERS