{"id":3774,"date":"2021-03-22T10:31:24","date_gmt":"2021-03-22T14:31:24","guid":{"rendered":"https:\/\/wp-unity.mspwebsite.com\/?p=3774"},"modified":"2023-03-20T15:30:36","modified_gmt":"2023-03-20T19:30:36","slug":"how-to-avoid-becoming-the-next-data-security-cautionary-tale","status":"publish","type":"post","link":"https:\/\/nexela.com\/?p=3774","title":{"rendered":"How to Avoid Becoming the Next Data Security Cautionary Tale"},"content":{"rendered":"<p>Data security isn\u2019t a matter to be taken lightly, as too many businesses have found out the hard way. Unfortunately, there are far too many simple ways to correct common security issues &#8211; enough that it\u2019s foolish not to do so. We\u2019ll review a few ways to fix security issues, after discussing one of, if not the, most egregious security failings in modern history.<\/p>\n<p><!--more--><\/p>\n<h3>The Equifax Problem<\/h3>\n<p>Sometime between May and July of 2017, the credit-reporting giant Equifax suffered a massive data breach that, as of this writing, exposed 148.1 million records containing the personally identifiable information of their customers. In other words, this breach exposed the data of almost half of the population of the United States of America.<\/p>\n<p>In the aftermath of the Equifax data breach scandal, former CEO Richard Smith was cross-examined by Congress. Upon hearing Smith\u2019s defense of \u201chuman and technology errors,\u201d Chairman of the House energy and commerce committee Greg Walden quipped, \u201cI don\u2019t think that we can pass a law that fixes stupid.\u201d<\/p>\n<h3>How to Fix Your Business\u2019 Security<\/h3>\n<p>While Walden may be correct that stupid can\u2019t be fixed by legislation, it may be able to be mitigated through the faithful enforcement of certain standards and practices. These standards should be enforced both on an organizational level, and on a case-by-case, personal basis.<\/p>\n<p>First, let\u2019s review what you should enforce in your organization:<\/p>\n<ol>\n<li><strong>Compliance<\/strong> should be the baseline &#8211; Unfortunately, compliance with regulations often does not equal true data security. Instead of looking at compliance as being the ultimate goal for your business, consider it the first step to your business security strategy.<\/li>\n<li><strong>Vulnerabilities<\/strong> need to be promptly remediated &#8211; It is astounding that so many exploits rely on known vulnerabilities\u2026 a full 99 percent of them.\u00a0\u00a0Furthermore, other attack vectors often utilize vulnerabilities that are a half a year old at least. Patching these vulnerabilities as soon as possible will help cut down on threats to your business\u2019 data and infrastructure.\u00a0<\/li>\n<li><strong>Data security<\/strong> needs to be centralized, organized, and assigned &#8211; While security should be a shared responsibility throughout the company, there needs to also be someone taking lead and accepting responsibility for ensuring that data is properly distributed in a secure fashion. Part of this responsibility should be to implement access controls, ensuring that the data only can spread to whomever it needs to and no one else.<\/li>\n<\/ol>\n<h3>Encouraging Your Employees\u2019 Security<\/h3>\n<p>Of course, your employees are largely in control of how secure your company remains. This could be a bad thing, unless they are also held to certain best practices that keep data, and the accounts that can access it, secure. There are a few basic rules you can enforce among your staff to help encourage them to act securely.<\/p>\n<ol>\n<li><strong>Lazy credential habits &#8211; <\/strong>There are a variety of behaviors to adopt that can better protect the accounts and solutions that your employees have. First of all, the classic password problem: reusing the same password for every account. If one or more of your employees does this, each one is essentially creating a master key that someone could use to access everything in their life, including your data. Neglecting to set a passcode of some sort for a mobile device can cause the same issue. An effective way to remedy this kind of behavior is to utilize a password management system. That way, your employee can reduce the number of passwords they have to remember, without sacrificing security.<\/li>\n<li><strong>Oversharing &#8211;<\/strong> While you can\u2019t necessarily control what your employees do in their off-hours, you should reinforce how easily a cybercriminal could piece together their passwords through some examination of their social media, especially if they subscribe to the lazy credential habits we just reviewed. See if they\u2019ll avoid sharing personal anecdotes or information without first restricting the audience that can see that particular post. At the very least, they should have their social media accounts set so that only their approved friends can see their content. Furthermore, do your best to avoid oversharing from the office. Images can easily show confidential information if you aren\u2019t careful, by accidentally capturing an invoice or your customer relationship management solution pulled up on a screen in the picture. Review what you are about to post before taking the image and before you share it online.\u00a0<\/li>\n<li><strong>Using the wrong Wi-Fi &#8211;<\/strong> While public Wi-Fi connections may be convenient, you should remind your employees that this convenience comes at a price: the security of public Wi-Fi is suspect at best. They should be warned against doing anything especially important over a public Wi-Fi signal, like banking or checking their email.<\/li>\n<\/ol>\n<p>Data security is a critically important consideration, in part because there are so many ways that it can be undermined. We have some solutions to offer that can help keep your business secure (despite what may sometimes seem to be your employees\u2019 best efforts). Reach out to Nexela at (215) 525-3223 today!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data security isn\u2019t a matter to be taken lightly, as too many businesses have found out the hard way. Unfortunately, there are far too many simple ways to correct common security issues &#8211; enough that it\u2019s foolish not to do so. We\u2019ll review a few ways to fix security issues, after discussing one of, if not the, most egregious security failings in modern history.<\/p>\n","protected":false},"author":4,"featured_media":3762,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54,50,61],"tags":[69,70,67],"class_list":["post-3774","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","category-blog","category-security","tag-best-practices","tag-maintenance","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Avoid Becoming the Next Data Security Cautionary Tale | Philadelphia, PA | Nexela<\/title>\n<meta name=\"description\" content=\"In the current security environment, there are some mistakes that are simply ludicrous to make. We review a few data security failings that you need to avoid in our blog.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nexela.com\/?p=3774\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Avoid Becoming the Next Data Security Cautionary Tale | Philadelphia, PA | Nexela\" \/>\n<meta property=\"og:description\" content=\"In the current security environment, there are some mistakes that are simply ludicrous to make. We review a few data security failings that you need to avoid in our blog.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nexela.com\/?p=3774\" \/>\n<meta property=\"og:site_name\" content=\"| Philadelphia, PA | Nexela\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PhiladelphiaITsupport\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-22T14:31:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-20T19:30:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nexela.com\/wp-content\/uploads\/security_cautionary_tale.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eric Disengof\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@NexelaInc\" \/>\n<meta name=\"twitter:site\" content=\"@NexelaInc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eric Disengof\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nexela.com\/?p=3774\",\"url\":\"https:\/\/nexela.com\/?p=3774\",\"name\":\"How to Avoid Becoming the Next Data Security Cautionary Tale | Philadelphia, PA | Nexela\",\"isPartOf\":{\"@id\":\"https:\/\/nexela.com\/#website\"},\"datePublished\":\"2021-03-22T14:31:24+00:00\",\"dateModified\":\"2023-03-20T19:30:36+00:00\",\"author\":{\"@id\":\"https:\/\/nexela.com\/#\/schema\/person\/5435031473121f8542dd2002ae241a9d\"},\"description\":\"In the current security environment, there are some mistakes that are simply ludicrous to make. We review a few data security failings that you need to avoid in our blog.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nexela.com\/?p=3774\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nexela.com\/#website\",\"url\":\"https:\/\/nexela.com\/\",\"name\":\"| Philadelphia, PA | Nexela\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nexela.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/nexela.com\/#\/schema\/person\/5435031473121f8542dd2002ae241a9d\",\"name\":\"Eric Disengof\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nexela.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/85f06e5e0c52138765f1a62466ec5a0779caee9daf1f1a3e2eca775fef7006e2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/85f06e5e0c52138765f1a62466ec5a0779caee9daf1f1a3e2eca775fef7006e2?s=96&d=mm&r=g\",\"caption\":\"Eric Disengof\"},\"url\":\"https:\/\/nexela.com\/?author=4\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Avoid Becoming the Next Data Security Cautionary Tale | Philadelphia, PA | Nexela","description":"In the current security environment, there are some mistakes that are simply ludicrous to make. We review a few data security failings that you need to avoid in our blog.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nexela.com\/?p=3774","og_locale":"en_US","og_type":"article","og_title":"How to Avoid Becoming the Next Data Security Cautionary Tale | Philadelphia, PA | Nexela","og_description":"In the current security environment, there are some mistakes that are simply ludicrous to make. We review a few data security failings that you need to avoid in our blog.","og_url":"https:\/\/nexela.com\/?p=3774","og_site_name":"| Philadelphia, PA | Nexela","article_publisher":"https:\/\/www.facebook.com\/PhiladelphiaITsupport","article_published_time":"2021-03-22T14:31:24+00:00","article_modified_time":"2023-03-20T19:30:36+00:00","og_image":[{"width":400,"height":400,"url":"https:\/\/nexela.com\/wp-content\/uploads\/security_cautionary_tale.jpg","type":"image\/jpeg"}],"author":"Eric Disengof","twitter_card":"summary_large_image","twitter_creator":"@NexelaInc","twitter_site":"@NexelaInc","twitter_misc":{"Written by":"Eric Disengof","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/nexela.com\/?p=3774","url":"https:\/\/nexela.com\/?p=3774","name":"How to Avoid Becoming the Next Data Security Cautionary Tale | Philadelphia, PA | Nexela","isPartOf":{"@id":"https:\/\/nexela.com\/#website"},"datePublished":"2021-03-22T14:31:24+00:00","dateModified":"2023-03-20T19:30:36+00:00","author":{"@id":"https:\/\/nexela.com\/#\/schema\/person\/5435031473121f8542dd2002ae241a9d"},"description":"In the current security environment, there are some mistakes that are simply ludicrous to make. We review a few data security failings that you need to avoid in our blog.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nexela.com\/?p=3774"]}]},{"@type":"WebSite","@id":"https:\/\/nexela.com\/#website","url":"https:\/\/nexela.com\/","name":"| Philadelphia, PA | Nexela","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nexela.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/nexela.com\/#\/schema\/person\/5435031473121f8542dd2002ae241a9d","name":"Eric Disengof","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nexela.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/85f06e5e0c52138765f1a62466ec5a0779caee9daf1f1a3e2eca775fef7006e2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/85f06e5e0c52138765f1a62466ec5a0779caee9daf1f1a3e2eca775fef7006e2?s=96&d=mm&r=g","caption":"Eric Disengof"},"url":"https:\/\/nexela.com\/?author=4"}]}},"_links":{"self":[{"href":"https:\/\/nexela.com\/index.php?rest_route=\/wp\/v2\/posts\/3774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nexela.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nexela.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nexela.com\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/nexela.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3774"}],"version-history":[{"count":0,"href":"https:\/\/nexela.com\/index.php?rest_route=\/wp\/v2\/posts\/3774\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nexela.com\/index.php?rest_route=\/wp\/v2\/media\/3762"}],"wp:attachment":[{"href":"https:\/\/nexela.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nexela.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3774"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nexela.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}