person with target

5 Mistakes That Can Jeopardize Your Network Security

Network Security
August 9, 2016
Beth Stewart

60% of cyber attacks in 2016 were aimed at small businesses. Securing your network and data are imperative in today's threat landscape.

Below is a list of the most common mistakes that can jeopardize your network.  

If you think network security is simply a matter of changing passwords and updating antivirus software. Think again.
  1. Weak Passwords You know you need to have a stronger password, yet “password”, continues to show up in the worst password lists year after year.  For maximum security, your password should contain numbers and letters, both upper and lowercase combined and be a minimum of 8-10 characters. Check to confirm  passwords on hardware such as routers and firewalls have been changed from the factory default.
  2. Lack of Education Most viruses and spyware are invited by the user; close to 90% of network compromises begin at the endpoint. Educate end users often, including information about current threats and how to recognize social engineering such as as phishing, business email compromise and vishing.
  3. Lack of Maintenance In the rush to meet demands and deadlines software security can be overlooked. No software is perfect, which means security loopholes will be exploited by hackers the minute they are discovered. It is critical to keep software and applications updated and patched.
  4. Plug and Surf. Computers are NOT designed “ready to go” out of the box. Before a phone line, ethernet cable or wireless access is anywhere near a new computer, certain security needs to be installed and/or configured. Ideally, this should include removing any bloatware or unneeded programs, operating system updates, software updates, virus protection, spyware scanners and background programs to prevent malicious software from ever being installed.
  5. Do It Yourself Setting up a network and applying proper security measures from the edge of your network to your end users can be tricky to say the least.  Small business owners should also ask for advice or even hire help. It's worth the extra cost. when you consider the tangible and intangible costs of a data breach, downtime and data loss.

Let the talented team at Pivotal IT help you keep your network safe and data secure!

Are you a small or medium sized business local to Spartanburg, Greenville, Boiling Springs, Greer,
Duncan, Gaffney, Hendersonville or Asheville with questions about Managed Technology Services?
Drop us a line or give us a call - We're happy to help! 

Unauthorized use and/or duplication of this material without express and written permission from Pivotal IT is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to Pivotal IT with appropriate and specific direction to the original content

more articles
Fileless Malware: How It Works and How To Avoid It
Occasionally know as non-malware, fileless malware lives in your computer’s RAM, doesn’t use software, and attacks vulnerabilities within the computer’s operating system and software programs.
Network Security
9 Attack Patterns of a Data Breach
Since 2014, the majority of Data Breaches have used the same nine attack patterns - understanding them is key to developing an effective Cybersecurity Strategy.
Network Security
The Risks and Benefits of Shadow IT
Like it or not, it is a part of your small business network. Discover how to strike a balance between the needs of your end-users and keeping your sensitive data is secure.
Network Security