Two-Factor Authentication: Protecting Your Online Accounts

Laptop and two-factor authentication devices

Two-factor authentication, or 2FA, is one of the easiest and most available multi-factor authentication approaches to protecting online accounts.

Analysis of recent online account breaches indicate that weak and reused passwords continue to be a common entry point for account or identity takeover and network intrusions.

Some simple steps and tools like two-factor authentication can help your end users employ unique, strong passwords for their dozens of accounts.

Wouldn’t it be nice if your accounts could let you know when someone new is trying to get into them? Even better, wouldn’t it be terrific to make a stolen password useless to others?

Were you tricked into revealing your password through a phishing scam? Rest easy, your account is safe! That’s essentially the control that two-factor authentication (2FA) — also known as two-step verification or login approval — gives to you. And, it only takes about two minutes to set up and two seconds to use. That’s a lot of power for very little effort!

How does it work?

Once you’ve activated two-factor authentication on an account, whenever an account login with your password comes from a different device from what you’ve already permitted, an authorization check will come to your smartphone or other registered device.

Without your approval or current code, a password thief can’t get into your account. (more…)

Share

Comments Off on Two-Factor Authentication: Protecting Your Online Accounts

Electronic Payments: Protecting Your Employees and Organization

Electronic Payments and Protection

Employees or small organizations are using electronic payments more than ever before. As the use of credit cards to make purchases and payments replaces the use of cash, and online merchants supplant brick-and-mortar stores, protecting electronic payments becomes more important.

Whether you are making payments for your own personal consumption or on behalf of your organization, electronic payments need to be protected.

Online sales in the United States grew to a record high of nearly 19 percent during the 2019 holiday season. At the same time, the convenience of using credit cards and other electronic payment services is compelling consumers to rapidly reduce their use of cash.

The 2019 Diary of Consumer Payment Choice report shows that cash is used about 50 percent of the time for in-person transactions under $10 (for things like lunch or coffee). For larger purchases of $25 or more, cash is used only 10 percent of the time. Cyber-criminals are taking advantage of the increase in electronic payments. (more…)

Share

Comments Off on Electronic Payments: Protecting Your Employees and Organization

Wireless Router: How To Protect Your Office And Home Wi-Fi Network

Wireless router technology symbol

Did you know that a wireless router can be the biggest security risk at your office?

In our region, thousands of companies use a cheap wireless router to protect their network. They don’t realize that hackers and malware can often bypass them and hurt the business.

What would a few days of network outage cost you? What would happen if your customer data was stolen? If you rely on a cheap wireless router, then these problems may be just a click away.

You should never use a router to protect your network. However, if you are stuck with one, the following steps may help limit your risk.

Steps to secure your wireless router

You can find many of the settings described below by logging into your router’s settings page. (more…)

Share

Comments Off on Wireless Router: How To Protect Your Office And Home Wi-Fi Network

5 Often Overlooked Security Measures For Mobile Devices

Hacker running away from a mobile device with a locked screen.

Threats to the business use of mobile devices are real and exist across all elements of the mobile ecosystem. According to the Department of Homeland Security (DHS), due to “the enhanced capabilities that mobile devices provide, the ubiquity and diversity of mobile applications, and the typical use of the devices outside the traditional network boundaries requires a security approach that differs substantially from the protections developed for desktop workstations.” (more…)

Share

Comments Off on 5 Often Overlooked Security Measures For Mobile Devices

Mobile Device Safety Tips For Commercial Printing Executives

Image of a mobile phone with a chain and padlock on it as a symbol of mobile device safety

Mobile Device Safety Tips For Commercial Printing Executives

It is safe to say that most executives of commercial printing businesses are tied to their mobile phones. Given the sensitive nature of the customer data they sometimes have to manage and communicate, mobile device safety is very important.

Commercial printing executives sometimes have a crazy schedule, and usually have to deal with the erratic demands from customers who want the job done now, on the fly – even when Print-on-Demand customers submit design materials late, or approve proofs at the last minute.

Mobile devices come in handy for looking up requests for quotes, proof approvals, sending files to customers, and browsing websites. At times, when there is a little break from the hectic schedule, mobile devices allow us to keep in contact with friends and family, buy stuff, and pay bills.

Mobile devices can be a double-edged sword. They allow us to store data, contact information, photos, emails and files; and when we can afford to take breaks, provide a source for entertainment.

They could also be a major source of headaches by exposing users to malicious software.

Not managing their usage properly can lead to situations where all that personal information and valuable data, not to mention the information of customers and partners, could be at risk. (more…)

Share

Comments Off on Mobile Device Safety Tips For Commercial Printing Executives

7 Critical Mobile Computing Security Measures for Nonprofits

Business Advisory Report Reveals 7 Critical Security Measures Every Nonprofit Must Put In Place NOW With Mobile Computing

7 Critical Mobile Computing Security MeasuresThere’s no doubt about it – the Internet and mobile computing and cloud computing have made our lives easier and our nonprofit organizations more productive, cost-effective and competitive. But make no mistake about it: the Internet is also a breeding ground for thieves and predators, not to mention an enormous distraction and liability if not used properly.

It is causing people to be casual, careless and flat-out stupid about their privacy in an increasingly litigious society where heavy fines and severe reputational damage can occur with one slip up – which is why you cannot be casual or careless about introducing it to your nonprofit organization. You can’t turn on the TV or read a newspaper without learning about the latest online data breach. And mobile devices are easily misplaced and stolen.

Because of all of this, if you are going to allow employees to use mobile computing devices – particularly personal mobile devices – to access, store and use the data of your nonprofit organization, then it’s critical that you have these 7 security measures in place. (more…)

Share

Comments Off on 7 Critical Mobile Computing Security Measures for Nonprofits