Xtrii
  • Solutions
    • Strategy & Transformation
    • Technology Leadership
    • Rapidly Improve Your IT
    • Address Risks
    • Cloud Expertise
    • Integrate & Optimize
  • Insights
    • Thought Leadership
    • Press Room
    • Subscribe
  • About
    • About Xtrii
    • The Xtrii Difference
    • Leadership & Approach
    • The Results
    • Global Clients
    • Client Access
    • Careers at Xtrii
  • Contact
    • Contact Us
    • Social Connections

​Thought Leadership

5 Hidden Cybersecurity Threats and How to Defend Against Them

12/6/2017

0 Comments

 
Picture
​Cybersecurity threats have evolved over the years. And for business owners to be prepared, it’s important that your protection and knowledge evolve accordingly. In the past, the right technology safeguards, such as firewalls and anti-virus/malware protection were adequate.
But now, hackers have responded by shifting their target from technical vulnerabilities to PEOPLE vulnerabilities. It’s much easier for a hacker to trick you into unknowingly giving up access to your computer and sensitive information.   Hackers often utilize our everyday habits and familiar tools for their exploits.  Below are 5 of these hidden threats, and how you can protect against them.

1. Portable drives
People often use USB portable drives for storing and transferring files.   Hackers know that they are a commonly used technology, so they’ll often load their viruses/malware on a USB portable drive and drop it near the entrance of a building.  They’ll even add a label titled “Confidential”, “Company Salary Information”, or other intriguing labels to entice you into picking it up and plugging it into your computer.  As soon as you plug it in your computer, the malware is immediately transferred to your computer and spreads to other computers on your network.  So, make sure you never plug in drives from unknown sources.  

2. Beware of “FREE”
Free apps and free social media services are frequently used to collect and sell your sensitive personal data. Your contacts, pictures, messages, and other very sensitive information are gathered by the app, and — unknown to you — are often uploaded to the provider to be sold to others. Your privacy and personal information is valuable. So, be careful with “free” apps and always look over the privacy policies for the social media websites you use.

3. Don’t use public or free WiFi  
While the free WiFi at the coffee shop, airport, or other public location may be convenient, it is also dangerous and best avoided if possible. Hackers can use free WiFi to gain access to your PC and steal information. Instead, try using the tethering option on your cell phone to setup your own private, secure internet connection (be sure to check your cellular data plan usage), or wait until you are back to your office or home to use a private, secured connection. 
   

4. Secure your paper documents
Don’t leave confidential/sensitive documents lying around on your desk unattended. Hackers can walk around an office environment looking for unattended documents they can use to gain access.  Before you leave your office, put away and protect those sensitive documents. Implement a “Clean Desk Policy” at your company.

5. Report suspicious activity 
If you see an unknown person walking around the office, or your computer system has changed in some way with no notice from your IT team, communicate it to management. Communication is vital to address these issues as you can work with your team to minimize the threat.
0 Comments

Your comment will be posted after it is approved.


Leave a Reply.

    Author

    ​Mark Johnson is the Chief Executive Officer at Xtrii. He is a 10x CIO, global technology advisor and business leader.  He has received global awards and recognition for excellence in technology and innovation. 
    ​For more than 30 years he has helped some of the world's best organizations optimize their technology and achieve extraordinary success.
    For more details visit his LinkedIn profile or follow him on Twitter @johnsonme.​

    Picture

    Archives

    April 2020
    March 2020
    December 2019
    November 2019
    October 2019
    June 2019
    March 2019
    February 2019
    January 2019
    August 2018
    July 2018
    June 2018
    April 2018
    February 2018
    January 2018
    December 2017
    December 2014
    November 2014
    June 2014
    April 2014
    March 2014
    February 2014

    Categories

    All
    CyberSecurity
    Excellence
    Healthcare
    Improving Performance
    Leadership
    Presentations
    Videos

    RSS Feed

© Xtrii, LLC, All Rights Reserved 
Austin  |  Dallas  |  Houston  |  San Antonio

Service Marks | Terms of Use | Contact
  • Solutions
    • Strategy & Transformation
    • Technology Leadership
    • Rapidly Improve Your IT
    • Address Risks
    • Cloud Expertise
    • Integrate & Optimize
  • Insights
    • Thought Leadership
    • Press Room
    • Subscribe
  • About
    • About Xtrii
    • The Xtrii Difference
    • Leadership & Approach
    • The Results
    • Global Clients
    • Client Access
    • Careers at Xtrii
  • Contact
    • Contact Us
    • Social Connections