Sorry!! The article you are trying to read is not available now.
Thank you very much;
you're only a step away from
downloading your reports.

Approaches to Securing Access to Your Business

By

PrintPRINT

This article is published in collaboration with Scutify, where you can find real-time markets and stock commentary from Robert Marcin, Cody Willard and others. Download the Scutify iOS App, the Scutify Android App or visit Scutify.com.

Gone are the days of using "Password" as the password for account access. Or, when people just used the numbers 12345678. Many people took the easy approach by using birthdays, anniversaries, and addresses.

Unless someone has been tuning out the many hacking incidents that have made data vulnerable with credit card numbers, social security numbers and other vital information, people are now taking notice and are using more secure approaches for data access. They hope that these strategies will protect them from hackers accessing confidential data.

Complexity and Other Strategies for Protecting Your Data

For some, mastering these approaches, keeping the passwords safe, and remembering the different passwords and codes seems difficult. Anything companies can do to make it work for the person who owns the data is most welcome. Without using information that can be accessed in public data, like children's names, addresses, schools, and education, develop a system to choose a code that has no relationship with anything that might be on a form that you'd fill out.

"We live in challenging times. Hackers are prolific, so we must outwit them with secure processes. Two-factor authentication is one tool we can use to protect businesses. Taking the threat seriously, look for organizations that provide the most secure approaches to keeping company payments secure and more difficult to access," said Marc Gardner, CEO, PayAnywhere.com, subsidiary of NorthAmericanBancard.

Here are some suggestions for making your data less or inaccessible to hackers:

Secure your data with two-factor authentication. By requiring two means to access information, both a password and passcode, accessing information works through a more stringent process. When choosing the codes and passwords, don't write them down anywhere you might bring them with you.

Apple iPhones now have a passcode plus a fingerprint system to get into the phone. Although it may seem cumbersome, if you are not a hermit and plan to use your phone outside of your home, using this two-factor authentication system is a great way to secure your phone data - and access to every connection you have.

Don't include information that is secure in emails. Hacking servers appears to be a piece of cake, so don't make it easy. If you need to provide credit card information, make certain that you have the correct person and company. Don't keep credit card access information in a computer file where it can be hacked.

Use a provider that can work through access, even from remote locations. You should be confident that you, who are supposed to access the information, can be recognized as the rightful owner and not be locked out.

Make sure you have a recovery code or route. You need a way to get into the system when you've mis-keyed the code or somehow become locked out. Know how to reach someone who can provide access and vouch for your ownership or right to access the account. If in doubt, go to your bank and provide information so they can verify your identity and change codes with you on the premises.

Don't put your codes, passwords, and security information in your wallet or in something you carry with you. Too many people leave their wallets in their car. Theft is just too easy. And, with insurance documents showing addresses and other personal information, you are vulnerable. Don't leave codes next to the credit card. If there is a possibility that you could forget where you left your phone, enable the "find my phone app."

We are in a world where no one dares leave their doors unlocked, no matter where they live. But every day, we see employees write down their passwords and leave them in their desk drawers, which they leave unlocked. No matter how many security seminars employees attend, there are still those who ignore the advice of trained cybersecurity professionals.

To leave information easily accessible and available is dangerous. Take precautions. Make a routine. Re-check if necessary.

It all comes down to trust - can you trust employees who handle your information? Have you kept the security information in the hands of a small group who are trustworthy? Do you have secure servers, automated 90-day password resets, and locked computer files with limited access?

Do you use SSL - (secure sockets layer) for establishing an encrypted link between a server and a client?

And even if your systems are secure - are you using third-party vendors who have excellent ratings and tested, secure systems? That's the final security check.


This article was written by Adam Monson for on .

This article published in collaboration with Scutify, the best app for traders and investors. Download the Scutify iOS App, the Scutify Android App or visit Scutify.com.

< Previous
  • 1
Next >
PrintPRINT
 
Featured Videos

WHAT'S POPULAR IN THE VILLE