<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1148227851863248&amp;ev=PageView&amp;noscript=1">

Cybersecurity: Strong Passwords and Data Security

Posted by Kayla Eggert, AINS, ARM on Dec 9, 2020 8:30:00 AM

Any business owner knows that cybersecurity is crucial for keeping company and customer data safe. You don’t have to look far for news stories about companies, large and small, losing money due to phishing scams or other cybersecurity breaches. No business is immune from these attacks. Even without the financial toll, these attacks can sometimes devastate a company’s reputation if customer data is compromised. Having strong cybersecurity policies in place is crucial for all businesses, large and small. Two key parts of this are having strong passwords and ensuring data is securely backed up.computer

Strong Passwords

It’s important for businesses to provide training to their employees on how to create strong passwords for any work devices employees use. Strong passwords include upper- and lower-case letters, numbers, and special characters. If possible, avoid situations where one device is used by multiple employees who share one simple password. This can be a recipe for disaster. Another way to create a strong login system is to use multifactor authentication, where after a password is entered the user is sent a security code or notification to a different device, like their phone. This may be useful software to invest in for extra sensitive information/data.

Backing Up Data

Despite using strong passwords, hackers could still manage to infiltrate your business’s software system. If you have all your critical data and information backed up, they won’t be able to hold your business hostage. If possible, back up data automatically. If automatic backups are not available, make sure you have a process for regular manual backups, weekly at minimum. Store these backups either off-site or on the cloud. Ensure backup data is kept just as secure as all the other data from your business.

Additional Resources

Check out our additional cybersecurity articles:

Phishing Attempts

Physical Device Protection

Topics: Cybersecurity

If you’re a content writer and would like to contribute to our blog, click here to read our guidelines.