An IT security breach’s impact is too large to ignore. Alarmingly, we are witness – or victim – to the rising tide of technological trauma. From spam to corporate scam, today’s IT breaches raise the bar on what is considered as common crime.
Where once lock, key, and a tight lip was sufficient in protecting important information, today’s interconnected environment demands tighter, more sophisticated measures.
So what can we do to safeguard personal and company data from the unscrupulous?
We spoke with Microsoft MVP and top IT security expert, Orin Thomas, to find answers and he shared three smart practices that each of us can adopt to step up security:
Resist WiFi Wanderlust
People who travel with laptop or tablet computers should avoid connecting to any WiFi access point that they don’t own or that isn’t controlled by the organization. Assessing the security of a 3rd party WiFi access point is almost impossible. Even in a private airline lounge, someone in the seat across from you could be intercepting your network traffic or compromising your computer.
Orin Thomas at Nitro, Melbourne
Limit Joy on a USB Stick
Avoid storing organizational data on USB sticks as they are easy to lose and you don’t want anyone who finds your stick to be able to access your data. If you do need to regularly store data on a USB stick, ensure that it is secured with encryption. This way if you do lose it, the person who finds it is unable to access the data stored on the stick.
Free BYOD from Malware
If your organization has a “Bring Your Own Device” policy, ensure that you have a way to monitor the configuration of those devices, and/or place them on a network screened from the managed network. “User managed” devices are more likely to be behind “organization managed” devices when it comes to the application of software updates and up-to-date anti-malware definitions and are thus more likely to be compromised by malware.
By implementing these simple measures, you can help protect not only your personal data, but that of your family, friends and colleagues. After all, like many fun things in life, technology should be enjoyed responsibly.