301-571-5040    Get SUPPORT

Washington Works Blog

During the Holidays, Cybersecurity Matters at Work and Home

During the Holidays, Cybersecurity Matters at Work and Home

We’re right in the thick of the holiday season, which means two things: one, there’s a lot of data being exchanged between businesses and consumers, and (on a related note) two: there’s ample opportunities for cybercrime, targeting business and consumer both. Whichever side of the coin you are on at any moment, you need to be aware of the risks, and how to mitigate them.

As a Consumer
Let’s face it, the Internet is a fantastic resource for the savvy shopper to use as a means of identifying where the best deals are, be it online or in-store. However, when browsing openly in such a way, you need to ensure that you are doing so as securely as possible.

There are, of course, the more basic steps: making sure your anti-virus software is up-to-date and activated, practicing good password hygiene and strength. In addition to these precautions, there are other measures you can take to help keep the holidays merry and bright, free of a cyberattack.

While you’re browsing, you want to make sure that you are as defended as possible, and that you are browsing intelligently as well. The bar where the website’s URL appears should have a locked padlock somewhere in it, indicating that the website is secure and any data you input (like credit card information, for example) is protected behind encryption. Furthermore, as convenient as a free Wi-Fi connection may seem, it isn’t going to be worth your data being infected as a result.

As a Business’ Representative
Of course, the focus on consumerism that permeates this time of year doesn’t for a moment mean that businesses get a pass when it comes to potential cyberattacks. The holiday season means nothing to attackers, and will not prevent them from leveraging everything they’ve got against your business’ interests. This effectively makes it a requirement for any business to have policies to counteract some of a cybercriminal’s efforts.

These policies should address a couple things, the first of which ensuring that all of your business’ defenses are updated and activated.

Whether it’s your antivirus, your remote access solution, or anything in between, your entire network needs to be maintained and kept up-to-date. This means that any patches that have been released for your solutions should also be applied in addition to regular updates as they are made available.

Your users also need to play a role in your cybersecurity. With the holidays so close, there is likely to be an increase in holiday-themed scams and phishing attempts. A few simple lessons in best practices will help to keep your users aware of these efforts and how to prevent them. Anyone with network access should also be required to authenticate their identity a few times through various means.

Of course, it can also be challenging for a business to keep all this up while simultaneously attending to their regular operations. That’s why we do what we do at Washington Works. Give us a call at 301-571-5040, and have a happy and healthy holiday this year.

Securing Your Business from the Internet of Things
Gift Card Scam Making Problems for Holiday Shopper...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, January 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Malware Privacy Hackers Productivity Business Network Security Email Software Tech Term Internet Hosted Solutions Data Backup Mobile Devices Computer Data Ransomware Backup Managed IT Services User Tips Google IT Support Data Recovery Microsoft Outsourced IT Hardware Efficiency Productivity Innovation IT Services Cloud Computing Smartphone Small Business Managed Service Provider Encryption Social Media Business Continuity Business Management Workplace Tips Paperless Office Android Smartphones Remote Monitoring Data Management Windows 10 Save Money Managed IT Services Communication Collaboration Browser Windows 10 Office 365 Server Disaster Recovery Bandwidth Holiday Government Internet of Things Healthcare BYOD Infrastructure Tip of the week Communications Employer-Employee Relationship Scam Antivirus VoIP Work/Life Balance Vulnerability Facebook Wi-Fi IT Management Passwords Cybersecurity App Artificial Intelligence BDR Unified Threat Management Phishing File Sharing Hosted Solution Saving Money Upgrade Office Document Management Password Compliance Blockchain Windows Network Money Two-factor Authentication Mobile Device Chromebook Virtual Reality Risk Management Quick Tips Apps How To Maintenance Word Managed Service Politics SaaS Applications Customer Relationship Management Chrome Information Big Data Websites Robot Router Meetings Social Wireless Botnet Recovery Patch Management Remote Computing Vendor Management Mobile Device Management Gmail Automobile Regulations IoT Machine Learning Storage Data loss Identity Theft How To Point of Sale Automation VPN Tech Support Telephone Systems Remote Monitoring and Management Alert Employees Data Security G Suite Access Control HIPAA Business Technology Hacker Health Remote Workers Server Management Virtual Private Network Firewall Mobile Security Microsoft Office Private Cloud Computer Care Company Culture Downtime Samsung Taxes Electronic Medical Records Physical Security Smart Technology Twitter Website Training Computing Customer Service Digital Payment Smart Tech Backup and Disaster Recovery VoIP Techology IT Consultant Downloads Update IT Technicians Electronic Health Records WannaCry Shortcut High-Speed Internet Finance Firefox Superfish ROI Cameras Unified Threat Management Legal Staff Professional Services Monitoring Hard Disk Drive Bluetooth Distributed Denial of Service Spyware Address Financial Language Internet Exlporer Asset Tracking Tech Terms Staffing Comparison Enterprise Content Management Bookmarks Spam Cybercrime Notifications Connectivity MSP Human Error Avoiding Downtime Multi-Factor Security Mirgation Management Cyberattacks Monitors IT Solutions Managed IT Service Modem Development Authentication Law Enforcement CCTV User Error Sports USB Consulting Administrator Procurement Webcam Computer Repair Computing Infrastructure Value OneNote Theft Disaster Heating/Cooling Virtualization Specifications Unified Communications Favorites Permissions Proactive Permission Time Management Education Google Calendar Enterprise Resource Planning Files Upgrades Break Fix Processors Cookies Cables Authorization Networking Gadget Search Printer Wearable Technology Dongle Managed Services Provider Project Management Security Cameras Alerts Employee-Employer Relationship Uninterrupted Power Supply Servers Augmented Reality WiFi Black Friday Social Networking Bring Your Own Device YouTube Travel Fraud Star Wars Test Network Management Relocation Cleaning Legislation Chatbots Mobile Read Only Supercomputer Dark Web Nanotechnology Wires Service Level Agreement E-Commerce Managed IT IBM Vulnerabilities Conferencing Analytics Printing Licensing The Internet of Things Cortana GPS Cyber Monday Black Market Motherboard Settings Gadgets Budget Motion Sickness Crowdsourcing Cost Management WPA3 RMM IT Support Touchscreen Mouse Emoji Identity IT Budget Microsoft Excel Screen Reader Zero-Day Threat Google Drive SharePoint Utility Computing Features Corporate Profile Outlook Geography Instant Messaging Lenovo Remote Worker Web Server Cooperation Solid State Drive Statistics Office Tips Tracking Digital Mail Merge Users Personal Information Hotspot Assessment Fleet Tracking Operating System Cabling Error Tablet Managing Stress Help Desk Regulation Miscellaneous Mobile Office Fun Domains CrashOverride Public Speaking Presentation Hard Drives Lithium-ion battery Emergency Wireless Technology 5G Safety Marketing Printers Competition IP Address Hiring/Firing