TCS Data-bits
November 2016   
    In this issue. . .
- Why Edward Snowden Caused You to Think About Your Firewall Security
- 'Tis the season for cybersecurity
- 10 Ways to Keep Your Mobile Devices (and the Data on Them) More Secure
- 5 Email Security Tips for Employees and Organizations
- From the Break Room to the Boardroom: Creating a Culture of Cybersecurity in the Workplace
- Business Continuity Tip
           
 
From the Break Room to the Boardroom: Creating a Culture of Cybersecurity in the Workplace
used with permission from Norton by Symantec
by Nadia Kovacs


Whether you own a small business or a big one, you live in a world where cybersecurity is of paramount importance. Big business, small business, academic institutions, government agencies, nonprofits... all of these need to take an interest in cybersecurity or pay the price. It's a matter or success, but also a matter of national security. Those working in critical infrastructure have a special obligation to make sure that they're securing the workplace. Here are some of the best ways to create a culture of cybersecurity where you work.

Read more


Business Continuity Tip

The Cost of Free Wi-Fi

Over the remainder of the year, many of us will be traveling for the holidays. Chances are you'll be taking mobile devices with you and will want to connect to Wi-Fi. Public wi-fi is convenient, but it does come with risks. Be aware of the lack of security and follow these tips!

Think before you connect. Confirm the network name and login credentials with staff before hopping on. Try using your own (usually more secure) mobile network connection if you can.

Don't conduct sensitive activities. Most hotspots are not secure or encrypted, so avoid online shopping, banking, or any other sensitive work.

Keep software up to date. Install app and operation system updates immediately, whch include patches and security fixes for vulnerabilities.

Why Edward Snowden Caused You to Think About Your Firewall Security
by Barry Utesch

Edward Snowden has become a household name for most Americans or at least for those in and around technology. He's the person who leaked the secret that the NSA was viewing your emails, listening to your phone calls and other privacy-invading actions. Whether you believe what he did was a good thing for the American people or bad is not the purpose of this blog post.

My purpose in this blog post is to say that what he did caused a fundamental shift in how we view security and how we protect our small businesses. From a practical standpoint, what Snowden revealed was that your email is not private and that your Internet browsing isn't either. For most of us, this isn’t a problem because we are not doing anything that would interest the government but let's think further.

Read more

'Tis the season for cybersecurity
used with the permission of http://thenetwork.cisco.com
by Melissa Jun Rowley


Cybersecurity tips and strategies for retailers during the holiday season.

Holiday shopping is in full effect, and consumers, as well as retailers, are taking advantage of the benefits of the internet. US online shopping has steadily increased over the years. On Cyber Monday in 2013, e-commerce sales came to $1.74 billion, a rise from $1.47 billion the previous year. In 2014, online consumer spending on Cyber Monday surpassed $2 billion for the first time. This year the total is expected to jump even higher. While connectivity is opening doors for buyers and businesses and all this growth has it perks, it comes with consequences—the cyber hacking kind.

Read more

10 Ways to Keep Your Mobile Devices (and the Data on Them) More Secure
used with permission from SBA.gov
by Anita Campbell


Mobile devices pose heightened security risks. Those risks come in several forms.
  • Devices — including business data saved on them such as call records, contacts, images, videos, documents and email messages — can be lost or stolen.
  • If you use mobile apps or cloud software accounts with saved logins, anyone could conceivably access your business data through those apps or accounts via a stolen or lost mobile device.
  • Devices used over insecure connections such as public Wi-Fi, can expose data to hackers and eavesdroppers who steal login credentials, banking and credit card information, emails, and more.
  • Mobile devices may serve as a backdoor for malware to enter your business network.
Read more

5 Email Security Tips for Employees and Organizations

We send an astonishingly huge amount of email: over 205 billion emails per day. And the number is still growing. Email is a critical communication tool for businesses. It's also a gateway for hackers, viruses, and other nasties. Here are 5 email security tips for keeping your email and your information secure.

1. Stay watchful and cautious

It's easy for an unauthorized person to email you and pretend to be a vendor or business partner. Be cautious and double-check before responding to sensitive requests.

Read more

168 Thatcher Rd.    |   Greensboro, NC  27409   |    336-632-0860   |   tcsusa.com

Symantec - Microsoft - Sonicwall - VMWare