Call Today

+1 440-322-ILER(4537)

}
Hours

Mon – Fri, 9am to 5pm

Tech Blog

your go-to resource for all things tech! Stay updated on the latest trends, industry insights, and expert tips to navigate the ever-evolving world of technology.

The Single Most Dangerous Assumption Businesses Make About Bank Security That Can Cause Them To Lose ALL Their Money

by | Apr 6, 2013

Here’s a shocker to most business owners: You’re bank often can NOT reclaim money stolen from your bank account due to fraud or cyber-crime. That means if money gets drafted from your business bank account from a hacker, phishing attack, identity theft or by any other means, you have little to no chance of getting it back.

This often comes as a surprise to businesses who think the FDIC will “save” them from getting their accounts wiped out, and can get the money back once taken. The reality is that the FDIC insurance is to protect you from bank failure, NOT fraud. So if your debit card or account information gets accessed by a hacker and you don’t notice it within the same day, you can pretty much kiss that money goodbye.

Recent studies have shown that 83% of small businesses take no formal measures against cyber-threats even though almost half of all attacks are aimed at them.

Here are 5 essential steps you can take right now to protect your business:

  1. Enforce A Strict Company Password Policy. This is a simple step, but it is still violated by many companies every day.  Make sure that you and your employees change passwords regularly, don’t use the same password for all accounts and require complex passwords.
  2. Set Up A Firewall. Small business owners tend to think that because they are “just a small business”, no one would waste time trying to hack into their network.  The fact is that hackers will target the weakest link.  Without a firewall, that “weak link” is YOUR company.
  3. Designate A Banking-Only Computer. Banking fraud is one of the biggest threats to small business.  The 2011 Business Banking Study showed that 56% of businesses experienced payment fraud (or an attempt at fraud) and 75% experienced account takeover and fraud online.  By using a single computer solely dedicated to online financial transactions (no e-mail, web-surfing, Facebook, YouTube, etc.) it’s much harder for outsiders to gain access to your information.
  4. Back Up Your Files Daily. It just amazes me how many businesses never back up their computer network.  You can lose data as well as money in a cyber attack.  Thanks to many new cloud based technologies, you can even schedule offsite backups to occur automatically.  If the data in your business is important to you, make sure that you have more than one copy of it.
  5. Educate Employees.  You staff is the first line of defense AND your biggest security hole at the same time.  Uneducated employees are one of the most common causes of data breaches.  Make sure that they are aware of the do’s and don’ts for your company with regards to data security.

 

Suspect Your Computer Has Been Hacked? Do These 5 Things Now!

The initial reaction when you suspect your computer or network has been compromised is to panic. However, if your network has been breached, what you do next can make the difference between the incident being a minor inconvenience and being a devastating disaster that...

3 Cyber Security Myths That Will Hurt Your Business This Year

Working amid the ever-changing currents of technology and cyber security, businesses often find themselves entangled in a web of misinformation and outdated ideas. But failing to distinguish between myth and fact can put your business’s security at serious risk. Based...

3 Technology End-of-Service Myths

It's crucial to keep all software and hardware up to date to maintain optimal security. If you don’t, cybercriminals can easily infiltrate your network and the chances for downtime increase significantly. However, many businesses don't realize that expired...

Did you know hardware and software expire too?

We are all aware of the term “use by date.” It is regularly used when talking about food and medications and refers to the date after which the product is no longer safe to consume. However, did you know that your software and hardware can expire too? This is because...

Top 9 Benefits of Outsourcing Your Cybersecurity

When it comes to protecting your business from cyber threats, having the right tools and technology is only half the battle. You also need the expertise, controls, and processes to manage and mitigate these threats effectively. That’s where a managed security service...