MSPs Elevate Cyber Security Hygiene for Businesses in Time of Crisis
With the rapid, unfortunate spread of COVID-19, we are constantly reminded of the tried-and-true “hygiene best practices” we can all employ to prevent additional infections. One of the things that has crossed my mind, as well as the minds of many of my colleagues, has been, “Gee, shouldn’t we be doing that already?” People are continuously shocked that we have to be reminded to wash our hands–a basic function we all previously thought we did so well.
And that got me thinking: From a cyber security standpoint, do we practice proper “cyber security hygiene?” How can MSPs help businesses master cyber security hygiene basics, especially as employers get creative with work-from-home arrangements?
Here are five things to consider when protecting customer data and brand reputation:
- Monitor email attachments: While email scams are certainly not exclusive to the COVID-19 pandemic, it behooves us to be extra scrupulous when we receive any email that looks even the slightest bit suspicious. Often these suspicious emails come with attachments. A simple rule of thumb we can all follow is: Unless a sender told you, in advance, “Hey, I’m going to send you this attachment,” you should avoid opening any attachment you receive in an email without investigating it first. Think about it: Would you open a suspicious package you were not expecting if it was mailed to your front door?
- Guard against social engineering within email correspondence: I know … we’ve all been there. Some wealthy prince in some far-away place, who is worth $40 quadrillion, has selected you—yes, you–to be the courier in an elaborate scheme to ex filtrate said riches from the grasp of some evil government entity … and you just want to help. Don’t! I know this should be an “It goes without saying” warning, but replying to suspicious emails is risky. Avoid communicating with unrecognized email addresses, regardless of how realistic the email seems. Also, be sure to avoid clicking on links or buttons in unfamiliar emails.
- Assess Wi-Fi connectivity: We want to be connected to the internet every second of every day. We’ve all done it: We’ve settled into our favorite coffee shop’s couch to do an hour or two of work. Predictably, we all did the same thing first: connected to the business’s Wi-Fi. But is it really the business’ Wi-Fi? Wi-Fi spoofing is an easy-to-set-up way for hackers to trick unsuspecting users into
- Page 1
- Page 2