Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

Data security: 5 digital hygiene protocols to implement now

It’s all about keeping your information secure.

July 26, 2019

Listen Now
 
The average total cost of a data breach in the U.S. is $7.91 million.
 
Surprisingly, a substantial portion of breaches can be prevented by educating employees on good digital hygiene.
 
We discuss the top digital hygiene practices that you can implement now with senior director of business sales at D-Link, Matt Vaillancourt
 
Listen Now
 

Let’s take a closer look at Matt’s podcast talking points

Strong password policies
This simple security practice is one of the most underused.
 
“The reality of it is that everyone is an access point to gain entry into a system.” —Matt Vailancourt
 
Execute a strong password policy at your company by… 
 
Providing a secure password manager. This helps employees keep track of passwords for their accounts instead of creating simple passwords or repeating them. 
 
Setting a maximum password age policy. Try establishing a maximum amount of time—such as three months—before users are required to create new passwords.
 
Installing a minimum password length and complexity policy. Be certain that lengthy and complex passwords are being used on all accounts.
 

Identify what phishing looks like
Common types of phishing attacks include:

  • The government poser
    This type of attack makes the message look like a federal institution is requesting your information.
  • The billing issue
    This type of attack can look really legitimate. The message typically claims there was an issue with a recent order and leads you to provide credit card or account information.
  • The contest winner
    These types of attacks claim that you’ve won something and ask for private information to send you the prize.
“All of us as everyday consumers are impacted by these decisions that we make with our online hygiene. —Matt Vaillancourt

Identify social engineering attacks
Phishing falls under a social engineering attack, as do malicious phone calls and face-to-face encounters.
 
Social engineering attacks work to collect little pieces of information about the victim. Seemingly trivial pieces of information can turn volatile when combined with other online data points.
 
“You can see how the painting becomes very bright when you start piling in all these data points.” —Matt Vaillancourt

Review social media privacy settings
One way to better control your digital data exhaust is to update your social media privacy settings.
 
Every platform you use should have privacy settings enabling you to only share posts with people of your choosing. This way, it’s harder for bad actors to collect your personal information.
 

Find the best cloud storage method
The three types of cloud storage enterprises can choose from:

  1. Public
    Public cloud storage providers, like AWS, provide the most cost-effective and convenient type of storage. Your information is stored on their servers, making it less secure than if it were on your own infrastructure.
  2. Private
    Private cloud storage implies that you’re storing information on your own servers. This isn’t the most convenient or cost-effective type of storage, but it is the most secure.
  3. Hybrid
    Hybrid cloud storage is a combination of public and private.
Take digital hygiene seriously
By adhering to Matt’s digital security tips, your company can avoid a costly data breach. Anybody can be an entry point into a larger source of information.
 
Follow Matt on LinkedIn.
 
For more information on D-Link go to D-Link.com or contact Ingram Micro’s Ashley Ruggiero.
 
Follow us on Twitter @IngramTechSol #B2BTechTalk
 
Sponsored by D-Link and Ingram Micro PartnerTrack.
 
 
Listen Now