9 Must-Read Posts for National Cyber Security Awareness Month

October is National Cyber Security Awareness Month! This is a great opportunity to raise awareness about a topic that is more pertinent than ever, as recent headlines show, and affects all businesses and organizations. To help in that effort, below is a curated list of helpful articles from our resource archives. All ten of these articles give businesses and organizations practical advice on how to keep their data safe. Read through them, and share this post with your friends and colleagues!


Ransomware

1. 10 Warning Signs Your Data Is at Risk for a Breach

This article is a great starting place for determining how secure (or insecure) your data is right now. If your business shows any of the ten red flags mentioned, such as using weak passwords or a lack of clear security policies, you may be at high risk for a breach—and the legal liabilities that follow.


Audit assessment

2. 5 Questions to Ask When Performing a Technology Risk Assessment

While targeted specifically to financial professionals, the tips listed in this article can help businesses and organizations of all kinds complete a thorough assessment of the risks present in their infrastructure.


Affinity-technology-partners-nashville-tn-ransomware

3. 4 Things You Need to Know About New Ransomware Threats

Ransomware is one of the most serious threats to businesses today. The sheer amount of downtime ransomware causes by taking your data hostage can be a huge financial burden, especially for small businesses. Read up on how you can avoid attack.


Fraudulent emails

4. How to Spot Fraudulent Emails

Fraudulent emails with infected attachments or bad links remain one of the best ways for cybercriminals to attack your systems. One of the best safeguards businesses can invest in, then, is the awareness of their employees. This post contains a test to determine how email savvy you are and some tips for spotting fraudulent emails.


Protect Data on Employee Mobile Devices

5. 4 Ways to Protect Data on Employee Mobile Devices

Mobile devices like smartphones, tablets, and even laptops are great for productivity, but they are riskier than desktop workstations when it comes to cybersecurity. Every organization should consider safeguards and clear policies for how staff members should access company data using mobile devices.


6. 7 Ways Encryption Can Protect Your Business

Encryption—rendering data unreadable to anyone who isn’t authorized to read it—is key to any cybersecurity strategy. Learn about the different ways you can incorporate encryption to protect your data assets.


Dropbox

7. Why It’s Not OK to Use Personal Dropbox Accounts for Work

File-syncing solutions like Dropbox can make sharing files across devices a snap. But if employees are using their personal accounts, this could put company data at risk. Read up on the dangers and what you can do about them.


Keys

8. 5 Low-Tech Tips for Preventing Data Breaches

With all the attention rightly paid to high-tech safeguards that are necessary to preventing breaches, it can be easy to forget the physical security of the systems that power your business. Learn about ways to keep your systems safe from physical intrusions.


Vulnerability Scans

9. Vulnerability Scans: What They Are and Who Needs Them

One tool for protecting your data that has become more common (and more affordable as a result) is a vulnerability scan. This is a surefire way of finding gaps in your cybersecurity efforts that need to be addressed, and it is required or recommended for many forms of regulatory compliance, including PCI DSS, HIPAA, GLBA/SEC, and FINRA.