Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

During the Holidays, Cybersecurity Matters at Work and Home

During the Holidays, Cybersecurity Matters at Work and Home

We’re right in the thick of the holiday season, which means two things: one, there’s a lot of data being exchanged between businesses and consumers, and (on a related note) two: there’s ample opportunities for cybercrime, targeting business and consumer both. Whichever side of the coin you are on at any moment, you need to be aware of the risks, and how to mitigate them.

As a Consumer
Let’s face it, the Internet is a fantastic resource for the savvy shopper to use as a means of identifying where the best deals are, be it online or in-store. However, when browsing openly in such a way, you need to ensure that you are doing so as securely as possible.

There are, of course, the more basic steps: making sure your anti-virus software is up-to-date and activated, practicing good password hygiene and strength. In addition to these precautions, there are other measures you can take to help keep the holidays merry and bright, free of a cyberattack.

While you’re browsing, you want to make sure that you are as defended as possible, and that you are browsing intelligently as well. The bar where the website’s URL appears should have a locked padlock somewhere in it, indicating that the website is secure and any data you input (like credit card information, for example) is protected behind encryption. Furthermore, as convenient as a free Wi-Fi connection may seem, it isn’t going to be worth your data being infected as a result.

As a Business’ Representative
Of course, the focus on consumerism that permeates this time of year doesn’t for a moment mean that businesses get a pass when it comes to potential cyberattacks. The holiday season means nothing to attackers, and will not prevent them from leveraging everything they’ve got against your business’ interests. This effectively makes it a requirement for any business to have policies to counteract some of a cybercriminal’s efforts.

These policies should address a couple things, the first of which ensuring that all of your business’ defenses are updated and activated.

Whether it’s your antivirus, your remote access solution, or anything in between, your entire network needs to be maintained and kept up-to-date. This means that any patches that have been released for your solutions should also be applied in addition to regular updates as they are made available.

Your users also need to play a role in your cybersecurity. With the holidays so close, there is likely to be an increase in holiday-themed scams and phishing attempts. A few simple lessons in best practices will help to keep your users aware of these efforts and how to prevent them. Anyone with network access should also be required to authenticate their identity a few times through various means.

Of course, it can also be challenging for a business to keep all this up while simultaneously attending to their regular operations. That’s why we do what we do at The Connection, Inc. Give us a call at (732) 291-5938, and have a happy and healthy holiday this year.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 23 January 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

WannaCry Storage Android GPS Private Cloud iPhone Solid State Drive Phone System Smartphones Cookies Virus Troubleshooting Privacy Management Alt Codes Mobile Device Management Google Drive Google Wallet Business Owner Botnet Productivity WPA3 Electronic Health Records Typing Twitter Printing Augmented Reality Regulations Programming Wearable Technology Hacks Flexibility Halloween Settings Lithium-ion Battery communications Education Comparison Presentation Business Intelligence Backup Two-factor Authentication Remote Monitoring and Management Users Electronic Medical Records Asset Tracking Taxes Virtual Private Network G Suite Virtual Desktop Multi-Factor Security Error Public Cloud Unified Threat Management Unified Communications Recycling Test Data Warehousing CCTV Health Cache Documents ROI Statistics Downloads Computer Care LiFi Hackers Risk Management Data Management Data Security Managed Services Provider Fraud 5G High-Speed Internet Modem Tip of the week Social Managed Service Google Maps Development Word VoIP Nanotechnology Managed IT Service Vulnerabilities Mobile Security Net Neutrality Training Data Breach Consultation How To Windows 10 Internet Exlporer IoT Theft Disaster Retail Search Authorization Google Calendar Data Backup Google Docs 3D Printing Cables Remote Computing Encryption Law Enforcement Application Social Media Mirgation Instant Messaging Scam Bookmarks Gmail Project Management Vendor Management Data storage Technology Laws Going Green Technology Artificial Intelligence Finance VPN Avoiding Downtime E-Commerce Office 365 Heating/Cooling Remote Workers Mobile Computing Virtual Reality Collaboration Business Chromebook Antivirus Upgrade Backup and Disaster Recovery Innovation Processors Cryptocurrency Administration Budget Customer Relationship Management Computer Repair Data loss Samsung Analyitcs Document Management Data Recovery Environment Spyware PowerPoint Social Networking Website IT Services Computers Entrepreneur Hosted Solutions Software YouTube Meetings Saving Money Read Only Staff Router Alerts Security Cameras Cybercrime Business Technology Mobile Device Workplace Tips Network Congestion Internet User Error Managed Service Provider IT Support Business Computing Hardware Lenovo Productivity Software Tips Compliance Business Continuity Employer-Employee Relationship Managing Stress Tip of the Week Networking User Customer Service Identities Files Machine Learning Passwords End of Support Access Control Superfish Business Growth Motherboard Maintenance Cooperation Microsoft Excel Dark Data Enterprise Resource Planning Identity Theft Remote Monitoring Printer Cortana Upgrades Cyber Monday Business Management Hard Drives Travel Hard Disk Drive MSP Domains Mail Merge Chrome Operations Quick Tips Information Technology User Tips Mobile Device Managment Firefox Mobile Help Desk PDF VoIP Sports Uninterrupted Power Supply Cloud Emoji BDR Black Friday Black Market Security Managed IT Services Administrator Undo Outsourced IT Enterprise Content Management Time Management IT Consultant Bring Your Own Device Downtime Best Practice Dark Web Authentication Trending Competition Applications Tracking Servers Running Cable Disaster Resistance Conferencing Permission WiFi Browser Hacking Wireless Technology Bandwidth Information Infrastructure HIPAA Hacker IT Consulting Internet of Things Techology Mouse Relocation Buisness Small Business Unified Threat Management Crowdsourcing Monitors Smart Tech SaaS Vulnerability Distributed Denial of Service Computer Server Management How To Digital Payment Cyberattacks Deep Learning Update Bluetooth Specifications Screen Reader Legislation Mobile Office Software as a Service Efficiency RMM Tech Term Staffing Computing Address Windows 8 Automobile Intranet Blockchain Backups Smartphone Wireless Corporate Profile Personal Information File Sharing Break Fix Wires IT Support Microsoft History Web Server Alert Legal Email Financial Hotspot Remote Worker USB Tablet Favorites Malware Websites Automation Geography Fun IT solutions Outlook Content Filtering Windows 10 Paperless Office Sync Hiring/Firing Piracy Physical Security IT Management Save Money Identity Office Big Data Humor Data Language Notifications Human Error Motion Sickness Display Phishing Utility Computing Zero-Day Threat Google Social Engineering Migration Gadgets Scary Stories Employee-Employer Relationship Mobility Network Cloud Computing Government Point of Sale Cybersecurity Experience Consumers Technology Tips Microsoft Office Recovery Tech Terms Connectivity Holiday Tech Support Features Analytics Co-managed IT Fleet Tracking Writing Laptop Digital Saving Time Telephony Knowledge Gadget Company Culture Disaster Recovery OneNote Proactive IT Employees The Internet of Things Redundancy CIO Ransomware Procurement Network Management Communication Mobile Devices Monitoring Wi-Fi Server eWaste Hard Drive Digital Signature Patch Management Healthcare Current Events Windows Safety Cost Management Hosted Solution Proactive Cabling Webcam Unsupported Software Managed IT Refrigeration Smart Technology IT Budget Telephone Systems Touchscreen Virtualization Money Politics Public Speaking Firewall SharePoint Supercomputer Cleaning Facebook Network Security IT service Permissions Mobile Data BYOD Assessment Computing Infrastructure Apps Star Wars IT Technicians IP Address IBM Managed IT services Save Time Shortcut Work/Life Balance Office Tips Licensing Cameras Chatbots Best Practices Apple Spam App Consulting Miscellaneous Robot Marketing Bitcoin Drones Password Operating System

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code