Browser security for business data

The internet isn’t for the naive. It’s a wild place populated by dangerous creatures like malware, scams, and hackers. And as any business owner today would know, data is everything. If you or your employees browse the net unprotected, this valuable resource is threatened by cyberattacks. One way to protect your business’s data is to secure your browsers. It is easy enough for every small- and medium-sized business (SMB) to do. Prevent browser tracking If you don’t like the idea of a third party (reputable or otherwise) being able to track your browsing habits, enable private browsing using built-in tools in your internet browser such as Chrome’s incognito mode. This offers protection against tracking by blocking third-party cookies as well as malware. Some browser extensions also boast secure Wi-Fi and bandwidth optimization and can guard against tracking and data collection from social networking sites such as Twitter and Facebook. Block adverts While online ads may seem harmless, the truth is they can contain scripts and widgets that send your data to a third party. A decent ad blocking program will stop banner, rollover, and pop-up ads, and prevent you from inadvertently visiting a site that may contain malware. Many blockers contain additional features such as the ability to disable cookies and scripts used by third parties on sites, the option to block specific items, and options to “clean up” Facebook, and hide YouTube comments. Consider setting up a virtual private network (VPN) Unfortunately, browser tracking and adware are not the only internet nasties that you need to be concerned about. Hackers can intercept sensitive data between two parties, allowing them to steal and corrupt valuable information such as bank details, login credentials, and other personal information. Installing a VPN can help solve this problem. VPNs encrypt your internet traffic, effectively shutting out anyone who may be trying to see what you’re doing. Install antivirus and anti-malware software Finally, it goes without saying that having antivirus and anti-malware software installed on your PC, tablet, and smartphone is crucial if you want to ensure your online safety. These software programs are your first defense against malicious parties intent on stealing your data. Is browsing at your workplace secure? Would you like a more comprehensive security system for your business? We can tell you all about it and help protect your business from online threats. Get in touch with us today. Published with permission from TechAdvisory.org. Source.

Which web browser is the safest?

Enterprise cybersecurity is a holistic system that involves employing security practices at every level of use. This includes picking out the most secure application for web browsing. Consider the security features of these popular web browsers when picking yours. Microsoft Edge Microsoft Edge, Windows’ current default browser, is an improvement over its predecessor Internet Explorer (IE). Edge was developed with Windows 10 integration and IE end-of-life in mind, resulting in a powerful and more efficient browser that has Cortana (Windows’ answer to Alexa and Siri) integration and Microsoft Store extensions. Edge’s main advantage is that it is Windows 10 computers’ native browser, which means it should integrate more seamlessly with the Windows OS ecosystem in terms of power usage and data security. Its built-in security features, called the Code Integrity Guard (CIG) and the Arbitrary Code Guard (ACG), prevent malicious codes from loading into a computer’s memory. Safari Safari is a graphical web browser developed by Apple for its iOS, iPad OS, and macOS. The current iteration is Safari 13, which was released alongside macOS Mojave and macOS High Sierra in September 2019. Safari 13 is highly secure, as it utilizes Safari 12’s baseline security features such as Automatic Strong Passwords and Intelligent Tracking Prevention 2.0. These features are augmented by a built-in password strength analyzer, FIDO02 USB security key authentication support, “Sign in with Apple” support, Apple Pay capabilities, and increased speed and encryption. Its main drawback, however, is that it is only available on Apple devices, with full capabilities found only on MacBooks and Macs. Mozilla Firefox Mozilla Firefox is a free and open-source web browser developed by the Mozilla Foundation. It is widely available across platforms, even on Unix and Unix-like operating systems such as FreeBSD, OpenBSD, illuminos, and Solaris Unix. Because of Firefox’s open-source development platform, it can be quite unsecure to use on publicly accessible computers. For personal and single-user business devices, however, Firefox is relatively safe, especially once all security features are activated and tweaked to your needs. Some key features are its “Do not track” privacy feature, phishing and malware blocking features, the Noscript Anti-XSS add-on (so you can determine which sites are allowed to execute scripts), the Noscript Anti-Clickjacking add-on (a detector that reveals invisible, malicious links and buttons), and its renowned pop-up ad blocker. Firefox is also unique in that Mozilla has a bug bounty program, which offers a financial reward to anyone who can identify gaps and holes in Firefox code, so that it can be patched and improved as urgently as possible. Mozilla also promises no legal action against anyone who complies in good faith under its Bug Bounty program, including any claim under the DMCA for circumventing technological measures. Google Chrome Google Chrome is a cross-platform web browser developed by Google. It is the default browser for Google’s line of laptops and Google Chromebooks. Chrome utilizes a process allocation model to sandbox tabs. “Sandboxing” is a security mechanism for separating running programs to keep software vulnerabilities from spreading. Chrome also regularly updates two sets of blacklists, one for phishing and one for malware, which it uses to warn users of potentially harmful sites. It also touts site isolation and predictive phishing protection features that receive regular and critical updates every six weeks and within 24 hours of a known threat, respectively. Being aware of how your web browser stacks up against its competitors is only half the battle. WannaCry spread to uninfected systems through a gap in the Windows security framework, and most other ransomware infections prey on human error. What your business needs is a comprehensive security audit. For more information, call us today. Published with permission from TechAdvisory.org. Source.

3 Cloud service models for your business

Cloud computing has become a staple in business strategy and IT architecture over the past couple of years. The functions and benefits of using the cloud let businesses seek to adopt new business models, obtain valuable insights from massive amounts of data, manage workloads, and gain competitive advantage. But cloud adoption can be tedious, and knowing the right kind of cloud to adopt for your business is critical to your success. This article will help you understand the three types of cloud service models. 1. Software-as-a-Service (SaaS) Easily the largest and most well known cloud-based service, SaaS uses the cloud to deliver apps to users, and these apps are then usually accessed via a web browser. This means users who have access to the internet can access the software from any device, at any time. Unlike physical software that you install on your computer, SaaS solutions are hosted on a provider’s servers. In a nutshell, SaaS is: Available over the internet Hosted on a remote server by a third-party provider Scalable, with different tiers for small, medium, and enterprise-level businesses Inclusive, offering security, compliance, and maintenance as part of the cost With SaaS, your provider is responsible for software maintenance and updates, which means users will all be using the same version of software and get updates at the same time. As a business owner, this means that managing the software on all of your computers is not only easier, but more affordable. SaaS software solutions include office document creation suites, accounting software, email, HR solutions, content management, customer relationship management (CRM), and more. 2. Platform-as-a-Service (PaaS) PaaS is primarily used by developers who need a virtual environment for developing and testing their own custom software or applications. This means developers don’t need to build and maintain their own infrastructure (which is comprised of networking devices, storage, servers, an operating system, and other necessary hardware and software) from scratch when developing applications, saving the firm time and money. Most companies who utilize PaaS do so to either host or develop their own software solutions, or to provide support for software used by employees. PaaS platforms are: Accessible by multiple users Scalable — you can choose from various tiers of resources to suit the size of your business Built on virtualization technology Easy to run without extensive system administration knowledge While PaaS is gaining in popularity with many small businesses, most won’t have firsthand interaction with this type of cloud because they won’t need to build their own software or app. 3. Infrastructure-as-a-Service (IaaS) IaaS offers services such as pay-as-you-go storage, networking, and virtualization. The most popular and well-known type of IaaS is the virtual machine — a digital version of a computer or server that is accessed over an internet connection. IaaS gives users cloud-based alternatives to expensive on-premises infrastructure so businesses can use their funds to invest in other things. In other words, if you are looking to virtualize your systems via the cloud, IaaS is a good place to start, as it allows you to move existing support systems into the cloud. Other solutions can then be migrated or introduced as needed. IaaS is essentially: Highly flexible and scalable Accessible by multiple users Cost-effective While the cloud offers a wide variety of benefits and solutions, choosing the service which is best for your company’s needs can be tedious. To ease this burden, get in touch with us today. We’ll help you find the best solution your business needs and ensure proper migration and implementation so you can focus on running your business. Published with permission from TechAdvisory.org. Source.

Optimizing website images for SEO

Small- and medium-sized businesses are often tempted to relegate their search engine optimization (SEO) analyses to the free reports offered by online platforms like WordPress and Google Analytics. Unfortunately, those reports rarely provide the details you need to make improvements. One of the things they tend to glaze over is image optimization. Do images really affect my SEO? One of the reasons images tend to be overlooked when auditing SEO is because it’s easy to forget just how many images your website has. Maybe you only had a few photos on your homepage when you first built your site. Over time however, you probably added countless visual elements to blog posts, landing pages, and team photos — drastically increasing the influence of your images on your SEO. Image resolution and load speed The first thing to check is how your images affect your site’s speed. If you’re using ultra high-resolution photos, those with mobile devices or satellite data connections will have trouble loading your site. Site load times affect your site’s ranking on Google, so make sure to pair your images down to a more reasonable resolution and save them as web-friendly file types. Choose the JPEG format for illustrations or big photos since it provides clarity and good colors in a smaller file size. Select the PNG format to preserve background transparency. Use the SVG format for icons and logos. Combine this with Javascript or CSS to resize SVG images without losing quality. Keywords and image title The days of keyword-stuffing are long gone, but that doesn’t mean you can get away with uploading images with filenames like “DSC2558.jpg”. Before doing so, make sure the names of your images are relevant to their content, such as “gym-trainer-helping-lift.jpg” or “call-center-customer-service.jpg”. This makes it easier for search engines to derive information from the images on a page. “Alt text” and title text Even though Google is getting better at recognizing image content without any help from text identifiers, describing your images in your website’s back-end is still important for SEO. Every image on your site should have enough text-based information without disrupting the user experience. To see how this works in WordPress, open your site dashboard and click on Media. This will display all the images, videos, and audio there. Click on any photo and you’ll have access to text editing tools. Whatever you include in the Caption field will be shown below the image, so check that it corresponds with your content. If not, skip it. In this case, user experience takes priority over SEO. The Alternative Text and Description fields will be visible to visitors only if the image doesn’t load or if they select it manually. They may not seem that important, but these should be considered non-negotiable for SEO purposes. Check that your site is doing all these things before requesting another SEO report. If your score changes, audit your image optimizations regularly. If you’re still seeing red, there are a number of web- and cloud-based platforms that can help improve your content. Give us a call today to find out more! Published with permission from TechAdvisory.org. Source.

Smartphone browsers now support biometrics

Google Chrome and Mozilla Firefox Lite support web-based biometric authentication. The leading mobile browsers now allow users to sign in to online profiles through fingerprint scanners, facial recognition, and the like. What’s more, online biometric authentication through these browsers requires no additional software. Authenticate your profile on your mobile device Chrome OS, Windows, MacOS, Linux, and Android are all adding features to help users safely log in using biometric identification via USB, Bluetooth, and NFC devices connected to smartphones and tablets. With such convenience, users can verify their accounts on the go. Preventing cyberattacks with browser-based biometrics Passwords are notoriously bad at protecting users’ accounts and the information they store. Facial scans, fingerprints, and voice recognition would make it exponentially harder for hackers to commit identity theft. That means you’re also less likely to be duped by an email from a hacker pretending to be your boss asking for the company credit card’s details. Enjoy more secure online transactions Biometric verification will also retire the need for logging in your information when shopping online, streaming video, using cloud applications, and other internet-based transactions. Windows 10 has already adopted features that offer limited account management with fingerprints and facial scans. Samsung phones now have Samsung Pay, which turns them into digital wallets that are protected by fingerprint or iris scans. Browser-based biometrics is starting to revolutionize and streamline the steps in verifying online accounts. It promises to add more security and ease in logging in and transacting on the internet. To keep up with the latest and greatest in browser-related innovations at your company, give us a call now. Published with permission from TechAdvisory.org. Source.

Smaller firms less likely to keep up to date on the basics that protect them

Smaller firms less likely to keep up to date on the basics that protect them. On the never ending problem of cyber security, small firms often do not have any/much in-house IT support. As a consequence, they may be less likely to be able to make sure their software is consistently updated to reflect any patches released by the product’s maker. This simple oversight, deliberate or not, is a major source of data breaches and ransomware attacks.Think back many years to when Microsoft pulled the plug on maintaining Windows XP. Many users refused to upgrade because there were afraid of losing compatibility with other software programs, the unintended consequences of moving to a new OS, or just not being sure how to install an upgrade. Whatever the issue, it meant those users had an operating system that was no longer updated to reflect the latest security fixes. Their operating system became an unlocked gate. You may not be scared of technology, but as a small business owner, tracking the release of new updates or taking the time to install them as soon as they come out probably just isn’t a priority. You have a business to run. Adding to this problem, you may also allow your employees to use their personal laptops, mobile devices, and tablets for work duties. If that is the case, then every program on each of those devices is subject to the owner’s willingness and ability to update everything in a timely fashion. If any single device accessing your corporate files and data misses a security patch and is breached, so is your business. The lesson here is that you need to take action to implement a company-wide process for maintaining all of your software applications so they don’t become an unlocked door in the middle of the night. A managed service provider can develop a plan to address update and security fixes on all the devices that access your data. It can be more than a small business owner can handle, so instead of ignoring the problem, reach out to find real solutions that will protect your business.

Cyberattacks and the vulnerability of the small business

Cyberattacks and the vulnerability of the small business You cannot go a day without reading about some big name company or even government agency being hacked and critical data being compromised. What you don’t see in the media is that most of the attacks happen to small firms, and that this is where a lot of the cybercrime is occurring. What any business, but especially a small business, needs to be afraid of are cyber attacks that disable your operations, disrupt customer interaction, or breach your customer’s personal data. Contrary to what one might expect, smaller firms are far more likely to be targets of hackers than large firms. They are also likely to have less sophisticated security measures in place. Any firm’s existence can be threatened by these events, but smaller firms are often unable to rebuild after a major breach. Studies show that customers are less forgiving of smaller firms than larger ones when their personal data has been compromised. The lesson here is that smaller firms are more vulnerable and need to be extremely vigilant. Talk to a managed service provider about some basic steps you can take to protect your business.

Denial is not a solution: Something you owe your customers and your employees

Denial is not a solution: Something you owe your customers and your employees Why do so many people procrastinate about making a will? Why is it so hard to get young people to buy health insurance? Because it is one of those “probably won’t happen–at least in the foreseeable future, and I‘ve got more interesting things to worry about or spend my money on” issues. Small business owners tend to take the same approach to making business continuity plans in case of a disaster. They are usually fully consumed just running the business and keeping revenues steady and growing. Diverting energies and resources to a “what if” scenario just isn’t an imperative. There are affordable, effective tools out there that will allow any smaller firm to develop effective business continuity plans, but they only work if you take action. Our best advice to overcome denial? Think of this scenario: If something happened right now and your entire operation came to a halt because of a cyber attack, a power failure, data loss, or a single point of failure hardware event, what would you do? Do you even know who you would call in for help? It can be a scary thought, but one that merits your attention. Talk to a managed service provider about a proposal to develop a complete business continuity plan. You owe it to yourself and to all the employees who rely on your for their livelihood.

Limited investment capital and planning for trouble

Limited investment capital and planning for trouble Small businesses often fail to take the time to make business continuity plans. One aspect of a business continuity plan involves developing plans to handle the loss of physical infrastructure and hardware. Unfortunately, smaller and younger firms often fail to address these issues because they lack the necessary capital to invest in additional or supplemental equipment. Redundant servers, battery back systems or uninterruptible power supplies, and data backup systems that allow for offsite backup storage are the most obvious examples. These can represent considerable capex for a small firm. However, these costs need to be weighed against the costs that would be incurred if a severe business interruption occurred. Encouragingly, new technology is creating tools for redundancy and data protection that don’t require additional hardware investments. The cloud is probably the single biggest savior for small businesses looking to defend against business interruption events. The cloud means you can offload many of your business processes and infrastructure to the cloud and sidestep creating expensive redundancies on your own. Offsite data storage, increased efficiencies as a result of shared data center costs, SaaS, and even data collaboration tools are added cost savings that can be provided by the cloud. So before you throw up your hands and say you cannot afford to address business continuity, take another look. The cloud can redefine the paradigm of “business continuity.”

Data Protection Laws and PIIs

Data Protection Laws and PIIs Last week we discussed the overall concept of “Data Protection Laws,” which govern the handling and securing of specific data. While these laws are wide ranging, most of these laws reference Personally Identifiable Information (PII) This “refers to information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other personal or identifying information that is linked or linkable to a specific individual.” (https://www.gsa.gov/portal/content/104256) For example, if you possess an individual’s first initial and last name and store it with their credit card number, bank account, SSN or driver’s license number, that becomes a PII. At the Federal level, the United States doesn’t have any overarching and comprehensive data protection laws of the sort that most European nations do, but they do exist and primarily affect individual sectors, such as healthcare. Presently 48 states in the US have some laws requiring private or governmental entities to notify anyone whose data has been breached. In other words, if you possess personal data, you may have a regulatory responsibility to report the breach to both a government entity and the individual victim. Failure to do so may mean you’re in violation of these laws and subject to fines and penalties. So what does this mean for a small business? You need to be aware of the likelihood that you are regulated by such laws and that you have some responsibility to show that you have taken reasonable measures and put in place procedures to maintain the security and integrity of outside data. As a responsible business owner, you have an obligation to be aware of any applicable laws, keeping in mind that your client or prospect data may include PII from those in other states or countries. You also have an obligation to protect that data. Keeping up with the best practices for protecting your important data from hackers and data thieves is an important responsibility of every small business. Contact a Managed Service provider to learn how they can support your business with a complete cyber protection plan.