Welcome to the final installment in our series of articles discussing information security. You can catch up on past articles here: #1, #2, #3, #4 and #5. This time around we’re going to discuss something that you might not normally thing about: PIN codes and passwords.
How many of you use a password on the main computer on which you keep client information so that if it’s lost or stolen the criminal doesn’t have instant access to your hard drive? How many of you use a PIN code to lock your smartphone or tablet for the same reason?
Read the rest of this entry »
Welcome to number five in our series of articles discussing Information Security. This time around we’re going to look at how to back-up your data securely while still allowing you to recover the information in the event of a disaster. You may want to read our previous articles here: #1, #2, #3 and #4.
Before we get into the discussion on back-ups and recovery, however, it’s important to understand what qualifies as a disaster. There have been several large scale disasters recently: the Japanese Tsunami, the Haitian Earthquake and flooding in Australia. But disasters don’t have to be large scale – and they don’t have to occur naturally. One dictionary definition of disaster is “a sudden or great misfortune or failure.” So dropping your laptop down the stairs – or your iPhone into the toilet – would qualify as personal disasters.
Welcome to number four in our series of articles discussing Information Security. You may find it helpful to read previous articles in this series: Information Security: An Introduction, Information Security: Malware Protectionand Information Security: Personally Identifiable Information.
Encryption is the word of the day and we’re going to explore what it is, why you need it and what can happen if you don’t use it. (This type of encryption differs from the encryption used by web browsers, in that the browsers only encrypt the data when traveling on the Internet. An encrypted file is secure until you unlock it with the correct key.)
Welcome to number three in our series of articles discussing Information Security. If you’re just joining, it may be helpful to familiarize yourself with the first two in the series: Information Security: An Introduction and Information Security: Malware Protection.
If you’ve been following the news lately, you’ve certainly seen (or been affected by) some recent breaches. Whether it was the TJ MAXX breach a couple years ago or the very recent Epsilon incident (which affected Hilton Honors as well as several credit card companies), breaches are becoming front page news. What actions need to be taken will depend on the type of information that was breached, or what was done to protect it.
Why do I need to be concerned?
Read the rest of this entry »
Welcome to number two in our series of articles discussing Information Security. In the last article, we provided a foundation to help you understand the different aspects of Information Security and how they relate to you.
You may have noticed that this article is not called anti-malware. That’s a very deliberate choice, because malware protection is much more than just installing an anti-malware product. But before we get into details, it’s worth taking the time to define what malware is – and what it isn’t.
Although this series of articles may not sound intriguing, the information they hold is critical to the well-being of your business. Just as you help your clients understand why they need travel insurance, our purpose here is to make you aware of the benefits of understanding and adequately addressing information security in your business. It can be the difference between surviving and going out of business. Read these articles to gain an overall understanding of what and how your business should be protecting. Don’t panic! If you do not consider yourself “tech savvy” just pass this information along to your “computer guy” (be it your teenage son or the Best Buy Geek Squad) and have them take the necessary steps to protect your clients, your business and yourself.