The average total cost
of a data breach in the U.S. is $7.91 million.
Surprisingly, a substantial portion of breaches can be prevented by educating employees on good digital hygiene
We discuss the top digital hygiene
practices that you can implement now with senior director of business sales at D-Link
, Matt Vaillancourt
Let’s take a closer look at Matt’s podcast talking points
Strong password policies
This simple security practice is one of the most underused.
“The reality of it is that everyone is an access point to gain entry into a system.”
Execute a strong password policy at your company by…
Providing a secure password manager
. This helps employees keep track of passwords for their accounts instead of creating simple passwords or repeating them.
Setting a maximum password age policy
. Try establishing a maximum amount of time—such as three months—before users are required to create new passwords.
Installing a minimum password length and complexity policy
. Be certain that lengthy and complex passwords are being used on all accounts.
Identify what phishing looks like
Common types of phishing attacks include:
“All of us as everyday consumers are impacted by these decisions that we make with our online hygiene.”
- The government poser
This type of attack makes the message look like a federal institution is requesting your information.
- The billing issue
This type of attack can look really legitimate. The message typically claims there was an issue with a recent order and leads you to provide credit card or account information.
- The contest winner
These types of attacks claim that you’ve won something and ask for private information to send you the prize.
Identify social engineering attacks
Phishing falls under a social engineering attack, as do malicious phone calls and face-to-face encounters.
Social engineering attacks work to collect little pieces of information about the victim. Seemingly trivial pieces of information can turn volatile when combined with other online data points.
“You can see how the painting becomes very bright when you start piling in all these data points.”
Review social media privacy settings
One way to better control your digital data exhaust is to update your social media privacy settings.
Every platform you use should have privacy settings enabling you to only share posts with people of your choosing. This way, it’s harder for bad actors to collect your personal information.
Find the best cloud storage method
The three types of cloud storage enterprises can choose from:
Public cloud storage providers, like AWS, provide the most cost-effective and convenient type of storage. Your information is stored on their servers, making it less secure than if it were on your own infrastructure.
Private cloud storage implies that you’re storing information on your own servers. This isn’t the most convenient or cost-effective type of storage, but it is the most secure.
Hybrid cloud storage is a combination of public and private.
Take digital hygiene
By adhering to Matt’s digital security tips, your company can avoid a costly data breach. Anybody can be an entry point into a larger source of information.
Follow Matt on LinkedIn
For more information on D-Link go to D-Link.com or contact Ingram Micro’s Ashley Ruggiero.
Follow us on Twitter @IngramTechSol #B2BTechTalk
Sponsored by D-Link and Ingram Micro PartnerTrack.