• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Articles
  • News
  • Events
  • Advertize
  • Jobs
  • Courses
  • Contact
  • (0)
  • LoginRegister
    • Facebook
    • LinkedIn
    • RSS
      Articles
      News
      Events
      Job Posts
    • Twitter
Datafloq

Datafloq

Data and Technology Insights

  • Categories
    • Big Data
    • Blockchain
    • Cloud
    • Internet Of Things
    • Metaverse
    • Robotics
    • Cybersecurity
    • Startups
    • Strategy
    • Technical
  • Big Data
  • Blockchain
  • Cloud
  • Metaverse
  • Internet Of Things
  • Robotics
  • Cybersecurity
  • Startups
  • Strategy
  • Technical

Are you Overlooking these 5 Critical IT Security Measures?

Kyle Cebull / 4 min read.
February 25, 2015
Datafloq AI Score
×

Datafloq AI Score: 81.33

Datafloq enables anyone to contribute articles, but we value high-quality content. This means that we do not accept SEO link building content, spammy articles, clickbait, articles written by bots and especially not misinformation. Therefore, we have developed an AI, built using multiple built open-source and proprietary tools to instantly define whether an article is written by a human or a bot and determine the level of bias, objectivity, whether it is fact-based or not, sentiment and overall quality.

Articles published on Datafloq need to have a minimum AI score of 60% and we provide this graph to give more detailed information on how we rate this article. Please note that this is a work in progress and if you have any suggestions, feel free to contact us.

floq.to/6lb0c

Let me ask you something: How well equipped is your company to deal with and respond to a potential data breach? On a scale of 1-10. Do you know? Not sure? Experian put out an interesting report regarding data breach preparedness. They found that 23% of respondents believed that their organization doesnt understand what needs to be done following a material data breach to prevent loss of customer and client trust. 30% werent sure at all and only 14% agreed. That should tell you that if youre not taking proactive steps to prevent and manage data breach, youre not alone. Thousands of companies are overlooking the most basic IT security measures and have little understanding for where to start. Are you one of those companies? Take a moment to explore five of the most commonly overlooked IT security measures and see how you stack up.

1) Password Complexity

The most common security passwords are 123456 and password. Common sense tells you that these are easily hackable and shouldnt be used, but we continue to use them year after year. If your employees use these types of passwords for their personal data, its not a far cry to believe that they might be setting their work passwords to something similar. While these may be easy to remember, theyre about the farthest you can get from secure. Make sure that you implement a standard for password complexity. The hardest to uncover are those that include special characters, a mix of upper and lowercase letters and numbers that are not sequential. Make sure that you educate your employees on the importance of secure passwords and offer a standard for them to use in creating their own password.

2) Password Change Frequency

Having a complex password protects your customer and company data significantly better than having a simple, easy-to-recognize password. But how often should your employees be changing this password? Every 30 days? More often? Less often? Youll be interested to know that users dont have to change their passwords as often as you might think. For example, this Lifehacker article references a few studies that actually suggest that frequent password changes can be detrimental to user productivity. Strike a good middle ground between frequent changes and leaving dry passwords to exist as your employees turn over. Depending on the sensitivity of customer data and how our clients infrastructure is configured, we recommend password updates as frequently as every 90 days or as infrequently as annually. Like most of your IT decisions, this is subjective. Do make sure that you change passwords when your employees leave, as you want to protect data access by those not within your organization.

3) Windows Patching

Windows patches can seem annoying. They can seen counter productive. If youve got a Type A employee that doesnt like to be interrupted they can even seem like a theyre inhibiting efficiency. But Windows Patches are what keeps your workstations and server up to date and protected against the latest security threats. Failure to implement these updates could mean a massive data breach or infection that could not only compromise data but take down your organization for days or weeks. In short? Complete these updates. Often. As often as every day is ideal, but if you have a Managed Services or IT provider that is completing these updates for you it wont be quite as intrusive for your users, as these updates can be done automatically every evening or during scheduled maintenance windows.


Interested in what the future will bring? Download our 2023 Technology Trends eBook for free.

Consent

4) Mobile Device Passcode

Weve covered mobile device security and BYOD extensively in our blog. This article in particular was pretty popular with regard to mobile security. When your employees bring their own devices and add their company e-mal to those devices, your company data is quite literally one swipe away. Making e-mail and mobile phone passcodes mandatory is one of the more important elements with regard to IT security. Its not optional.

5) User Security Policy

The absolute most important thing when it comes to your IT security and something you shouldnt ever overlook is having a security policy in place for your users. The policy should outline the handling of sensitive data, how mobile devices should be treated, password mechanics, and all other elements in your strategy. Just like you want to educate yourself on the importance of security, you have to educate your users on the why behind each step theyre taking. Just telling your employees to create a secure password isnt enough, they have to understand why theyre doing it. A security policy gets all your users on the same page and places a published standard of security compliance out to be clearly followed.

IT security isnt something to mess around with. Sure, small businesses are much less likely to be attacked than some of the major companies that have been breached to date, but that doesnt change the fact that it happens. Whether or not you continue to overlook these important IT security measures could be the decision that makes or breaks your business.

Categories: Cybersecurity
Tags: Big Data, mobile, mobile data, passwords, security, security analytics

About Kyle Cebull

Entech is an IT Consultant, Cloud Solutions and Managed Services Provider that caters to SMB's in the state of Florida and across the nation. With top rated IT Support, staff augmentation, project management, comprehensive managed services, and more - Entech has a comprehensive approach when it comes to a company's technology.

Primary Sidebar

E-mail Newsletter

Sign up to receive email updates daily and to hear what's going on with us!

Publish
AN Article
Submit
a press release
List
AN Event
Create
A Job Post

Related Articles

Why We Need AI for Air Quality

March 21, 2023 By Jane Marsh

A Complete Career Guide to Becoming an Artificial Intelligence Engineer in 2023

March 21, 2023 By Pradip Mohapatra

What Are Foundation AI Models Exactly?

March 21, 2023 By Terry Wilson

Related Jobs

  • Software Engineer | South Yorkshire, GB - February 07, 2023
  • Software Engineer with C# .net Investment House | London, GB - February 07, 2023
  • Senior Java Developer | London, GB - February 07, 2023
  • Software Engineer – Growing Digital Media Company | London, GB - February 07, 2023
  • LBG Returners – Senior Data Analyst | Chester Moor, GB - February 07, 2023
More Jobs

Tags

AI Amazon analysis analytics application applications Artificial Intelligence benefits BI Big Data business China Cloud Companies company costs crypto Data design development digital engineer environment experience finance financial future government Group health information machine learning mobile news public research security services share skills social social media software strategy technology

Related Events

  • 6th Middle East Banking AI & Analytics Summit 2023 | Riyadh, Saudi Arabia - May 10, 2023
  • Data Science Salon NYC: AI & Machine Learning in Finance & Technology | The Theater Center - December 7, 2022
  • Big Data LDN 2023 | Olympia London - September 20, 2023
More events

Related Online Courses

  • Build automated speech systems with Azure Cognitive Services
  • Sneak Peek: Dartmouth’s Digital Transformation Certificate
  • Velocity Data and Analytics Summit, UAE
More courses

Footer


Datafloq is the one-stop source for big data, blockchain and artificial intelligence. We offer information, insights and opportunities to drive innovation with emerging technologies.

  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Recent

  • How BlaBlaCar Built a Practical Data Mesh to Support Self-Service Analytics at Scale
  • How Blockchain Technology Can Enhance Fintech dApp Development
  • How to leverage novel technology to achieve compliance in pharma
  • The need for extensive data to make decisions more effectively and quickly
  • How Is Robotic Micro Fulfillment Changing Distribution?

Search

Tags

AI Amazon analysis analytics application applications Artificial Intelligence benefits BI Big Data business China Cloud Companies company costs crypto Data design development digital engineer environment experience finance financial future government Group health information machine learning mobile news public research security services share skills social social media software strategy technology

Copyright © 2023 Datafloq
HTML Sitemap| Privacy| Terms| Cookies

  • Facebook
  • Twitter
  • LinkedIn
  • WhatsApp

In order to optimize the website and to continuously improve Datafloq, we use cookies. For more information click here.

settings

Dear visitor,
Thank you for visiting Datafloq. If you find our content interesting, please subscribe to our weekly newsletter:

Did you know that you can publish job posts for free on Datafloq? You can start immediately and find the best candidates for free! Click here to get started.

Not Now Subscribe

Thanks for visiting Datafloq
If you enjoyed our content on emerging technologies, why not subscribe to our weekly newsletter to receive the latest news straight into your mailbox?

Subscribe

No thanks

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Marketing cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Please enable Strictly Necessary Cookies first so that we can save your preferences!