Y
          
        
        
          ou’re busy. Too busy. Too busy to think about foolishness that could happen –
        
        
          until it does. Think of the mess if you caught an embezzler in your office – or
        
        
          if all of your customer info leaked to a bad guy. Your customers would be
        
        
          yelling all over the internet about it. The press would have a field day. And
        
        
          you could not get a big enough bottle of aspirin to stop that headache.
        
        
          Today’s technology is fantastic, until it is used against you. Here’s a simple
        
        
          guide to keep your office safer, with simple action steps you can use this week
        
        
          to avoid the Cyber Complacency that your busy days can create.
        
        
          IS YOUR PET’S NAME YOUR PASSWORD?
        
        
          I have 100 usernames and passwords to remember, just like you. How do
        
        
          you keep them straight? You could write them on paper and keep it in your
        
        
          desk drawer. A non-US hacker can’t get them there, but your embezzling co-
        
        
          worker might. You could use your pet’s name, Fido, and add 1234 at the end.
        
        
          The hacker will find Fido’s name on your Facebook page, though, and try
        
        
          the 1234 thing. You could use a service like lastpass.com to store passwords
        
        
          for you. Just make sure you trust the vendor. You could store your passwords
        
        
          on your phone – and take constant care not to leave it somewhere. Do any of
        
        
          these methods work for you?
        
        
          THE NEW PASSWORD
        
        
          Security experts that charge millions will tell you that great security is
        
        
          more than just a username and password. Ideally, you only get access with
        
        
          something you know, plus something you have. An example of something
        
        
          you know is a password. Ideally, you have that memorized. Something you
        
        
          have is your phone – a phone that can receive a text message with a one-time
        
        
          use code for this one time you are accessing the system. This method is called
        
        
          “two-factor authentication.” If you have this option with anything you log into
        
        
          now, strongly consider activating it today. If a hacker gets your username and
        
        
          password, they likely won’t have your phone to receive the one-time use code
        
        
          needed to log into your account. You win. The Hacker loses… well, at least
        
        
          he moves on to the next guy and steals from him.
        
        
          LOOSE LIPS SINK SHIPS
        
        
          I mentioned Facebook. What are you putting online about yourself? Hackers
        
        
          – and your local enemies – can learn a lot about you from what you post
        
        
          online. Sure, you have your privacy settings turned on – until a privacy policy
        
        
          changes one day and you did not get the word. Then the world sees all your
        
        
          relatives’ names and where they live, your mother’s maiden name and where
        
        
          she lives, your date of birth, and more. These are all great tools that bad
        
        
          people can use to steal from you. Is it a good idea to have the answers to all
        
        
          your security questions all over the internet for everyone to see? Think about
        
        
          whether your security answers and passwords match anything on your social
        
        
          media connections. If they do, take ten minutes now to change them
        
        
          .
        
        
          PREVENT OFFICE COMPUTER LEAKS
        
        
          U.S. Law Enforcement often does not have resources to catch small-
        
        
          scale hackers. You have to protect yourself – and your reputation. What if
        
        
          everything you typed was being sent – as you typed it – to a hacker overseas?
        
        
          Did you check your online banking today? The bad guys saw the website
        
        
          you went to, the username you entered, and your password. Did you key in
        
        
          an application for new service today? They saw all that, too. I am sure you
        
        
          scan your computers automatically for viruses, but what about malware, bots,
        
        
          keystroke loggers, and other bad things that can copy your every word and
        
        
          send it off to the Land of Hackerville? Pay special attention to every computer
        
        
          you use to type in credit card or bank account numbers. Your credit card
        
        
          service provider should provide a scanning tool for this purpose. If not, ask
        
        
          me about getting a new provider that does.
        
        
          10
        
        
          NCRWA.COM |
        
        
          Summer 2015
        
        
          feature
        
        
          – CYBER SECURITY FOR BUSY PEOPLE –