Data Loading...

AZCOMP Technologies IT March 2019

142 Views
19 Downloads
3.32 MB

Twitter Facebook LinkedIn Copy link

DOWNLOAD PDF

REPORT DMCA

RECOMMEND FLIP-BOOKS

AZCOMP Technologies IT March 2018

it-solutions MARCH 2018 Empowering Small Practices To Deliver The Best Care THE GREATEST THREAT TO Y

Read online »

AZCOMP Technologies - IT - March 2021

it MARCH 2021 Empowering Small Practices to Deliver the Best Care IT HEAD IN THE SAND OR EYES ON THE

Read online »

AZCOMP Technologies IT - March 2020

it. DOWNLOAD OUR FREE REPORT Protect Your >Page 1 Page 2 Page 3 Page 4 www.azcomp.com Made with Flip

Read online »

AZCOMP Technologies March 2019

blog PRST STD US POSTAGE PAID BOISE, ID PERMIT 411 2500 S. Power Rd., Ste. 117 Mesa, AZ 85209 i nsid

Read online »

AZCOMP Technologies IT June 2019

AZCOMP Technologies IT June 2019 855-556-4677 www.azcompit.com JUNE 2019 Empowering Small Practices

Read online »

AZCOMP Technologies IT September 2019

AZCOMP Technologies IT September 2019 855-556-4677 www.azcompit.com SEPTEMBER 2019 Empowering Small

Read online »

AZCOMP Technologies IT August 2019

AZCOMP Technologies IT August 2019 855-556-4677 www.azcompit.com AUGUST 2019 Empowering Small Practi

Read online »

AZCOMP Technologies IT December 2019

it DECEMBER 2019 Empowering Small Practices to Deliver the Best Care IT DON’T GET CAUGHT UNAWARE Cyb

Read online »

AZCOMP Technologies IT January 2019

AZCOMP Technologies IT January 2019 (855) 556-4677 www.azcompit.com JANUARY 2019 Empowering Small Pr

Read online »

AZCOMP Technologies IT July 2019

7, so playing defense in some form is a very good idea. SPOTLIGHT ON EMMANUEL GARZON Emmanuel Garzon

Read online »

AZCOMP Technologies IT March 2019

855-556-4677 www.azcompit.com

MARCH 2019

Empowering Small Practices to Deliver the Best Care

IT

World famous cryptographer Bruce Schneier once said, “Only amateurs attack machines; professionals target people.” The reason is simple. While technology improves all the time, humans are prone to making mistakes. A hacker has no idea how sophisticated a defense system will be until they make an effort to penetrate it. However, they know exactly how to prey on unsuspecting employees to bring a computer network to its knees. People make mistakes. It’s one of the basic facts of life and certainly something you’ve experienced as a business owner. No matter how many failsafes you put in place, your employees will eventually leave the building without arming the alarm system. No matter how many times you make it a company-wide mandate to clean your dishes, somebody will still leave a crusty plate in the sink. However, when it comes to mistakes that compromise your cybersecurity, you don’t always have a chance to fix them. When small businesses get hacked, they have over a 50 percent chance of closing within six months. It makes absolutely no sense that employers don’t spend time training their teams on how to behave safely online. In an effort to help you understand why training is so essential, I want to detail three ways hackers use human vulnerability to penetrate networks and access private information. When you see things from a hacker’s perspective, it’s easy to see why humans are the easiest targets. SOCIAL ENGINEERING In the world of computer science, social engineering refers to the process by which a hacker exploits a person into giving up confidential information, most commonly through phishing emails. Using cues that a user finds comfortable and familiar, a cybercriminal places a nefarious link within an innocent-looking email. At their worst, phishing emails look like an elementary school attempt to mimic an official message. At their best, however, they can be extremely convincing. JUST MACHINES And Some of Those Humans Are Your Employees HACKERS ATTACK HUMANS, NOT

The best way to defend against social engineering is training. If an employee doesn’t understand the threat of phishing, there’s no reason for them to be skeptical of emails they receive. You can even set up pseudo-phishing tests to let you know which team members are most susceptible to clicking on something they shouldn’t. FAILURE TO UPDATE AND COMPLY Like it or not, some of your employees are going to try to bypass any safe internet measures you implement. According to cybersecurity firm Dtex Systems, 95 percent of businesses have one such employee on staff. It’s important to make sure all employees follow whatever security rules you establish. There’s no worse fate than suffering a preventable attack because one person thought it was no big deal to install Facebook Messenger on a company laptop. The biggest compliance issue is updating apps and software. Many people regard updating as a nuisance, even though it rarely take longer than a few minutes. These updates contain the latest security fixes, which are a crucial line of defense. Without them, you make your system a target for hackers. THE PROVERBIAL INSIDE MAN Even worse than employees who don’t regard the rules as important are those who act intentionally against the interests of your company. In the vast majority of cases, people who sell confidential login credentials or other private information are disgruntled employees who are angry about being fired. To keep this from happening, deactivate accounts the second somebody is no longer an employee. These favored methods for hackers prove just how essential employee training is for proper cybersecurity. We can help your team learn the tools and gain the awareness required to deter criminals. It’s part of our job. –Byron Adams

855-556-4677 AZCOMP Technologies www.azcompit.com • 1

Published by The Newsletter Pro • www.TheNewsletterPro.com

Passwords subsection, you’ll find alerts regarding the strength and uniqueness of your passwords. The app can even tell you if you’re using the same password for multiple accounts. It’s an awesome way to get a quick snapshot of a crucial aspect of online security. SCREEN TIME MONITORING For the past few versions of its mobile operating system, Apple has included features that allow users to be more mindful of their device usage. The latest is Screen Time, which can be found in the Settings app. It allows users to monitor how much time they spend on their phones down to time spent on specific apps. When you realize you’re wasting too many hours using an app, you can set limits that will disable it once you’ve been on it for a prescribed amount of time. BETTER APPLE MUSIC SEARCH Those who choose Apple Music over Spotify often lament that they have the better platform stuck under an inferior user experience. Apple has taken steps to remedy this concern, most notably in the form of a better search function. You can now search songs by lyrics, which is incredibly useful when trying to find the title of a tune stuck in your head. AWESOME, UNHERALDED IPHONE FEATURES Ways to Get More From Your Phones NEED NETWORKING OR COMPUTER HELP?

If you have an iPhone, you run the iOS operating system. Now in its 12th official iteration, the current iOS has an array of excellent features most users overlook. While Memojis are a ton of fun, they aren’t necessarily making your device more useful. These underused capabilities, on the other hand, certainly will. DOCUMENT SCANNING It may not be a glamorous or hyper-revolutionary innovation, but Apple’s integrated document scanner in the Notes app flat out works. To use it, simply tap the “+” icon above the keyboard while in the app, click “Scan Document,” and hover your camera above the document you wish to scan. Once uploaded, you’ll be able to easily read, edit, and save the document. It’s perfect for people who need to digitize documents on the go. PASSWORD STRENGTH ASSESSMENT If you’ve never opened the Passwords & Accounts section of your settings, iOS 12 gives you a very good reason to. In the Website & App SPOTLIGHT ON SHANNON TRUJILLO

Shannon Trujillo joined AZCOMP a little over six months ago. Since coming aboard, she’s been impressed with our company culture and the friendliness of her teammates. “Everyone is so nice,” she says. “The atmosphere here is just incredible. It’s a great place to come to work.” As a support technician, Shannon spends most of her day on the phone assisting our customers. “I love being able to help people resolve their issues. That’s my favorite part of my job,” she reveals.

Call our direct support line: 480-730-3055 Create a support ticket via email: [email protected]

Learn more about how to get unlimited computer and networking support at AzCompIt.com. DOWNLOAD OUR FREE REPORT

Protect Your >Page 1 Page 2 Page 3 Page 4

www.azcomp.com

Made with FlippingBook - Online catalogs