If your business has employees, volunteers, or consultants who use portable wireless devices onsite and offsite, you should address IT security and privacy with an Action Plan, which is Step 3 of our 3-part series. Your Action Plan will include policies, tools, training, and other ways to improve your security. The Back Story We’re leading … Continue reading Security Tip: What are your people doing with WiFi? (Part 3)
As explained in last week’s Security Tip, we advise businesses to assess how their staff, volunteers, and contractors are using portable wireless devices for business tasks. To get you started last week, we provided this template for your Step 1 Inventory. If this process seems burdensome, just keep in mind there could be a lot … Continue reading Security Tip: What are your people doing with WiFi? (Part 2)
Do you have employees, contractors, or volunteers who use a smartphone or laptop at your facility, and also take it offsite? If the answer is yes, it’s time for you to do a bit of information-gathering. Why? Because you need to understand how these devices are being used, so you can provide guidelines and help … Continue reading Security Tip: What are Your People Doing with Wifi? (Part 1)
When you download software applications, whether free or paid, there are important precautions you and your staff should take. Following these guidelines will help your business improve cyber-security and reduce the risk of data breach. 1 DO advise your employees to follow these tips, and to avoid downloading games on workplace computers if possible. Even … Continue reading Downloading software? Watch out!
Look before you leap! There are pros and cons to cloud data storage. If you decide cloud is not for you, we offer another type of offsite data storage. Backups Cloud storage means your data will be backed up offsite for use in a crisis. In practice, you might be surprised at how long it … Continue reading Security Tip: Cloud Considerations & Alternatives
As an organization that keeps, stores, or transmits PHI (Personal Health Information), you know that your network and computers must be maintained, protected, and used in a way that complies with HIPAA technical rules for privacy and security. But what about the security of other devices that connect to your network? Here are some categories … Continue reading HIPAA Tip: Device Security for Compliance
How much do you know about the maintenance of your web site? I’m not talking about new posts, or edits to keep a page current. I mean the back-end stuff. Because this stuff is really, really important for your cybersecurity. Many freelancers are getting into website design because they like doing graphic design, but not … Continue reading Security Tip: There’s more to your website than meets the eye. Here’s how to keep it safe.
One of the most important aspects of your computer system (and often the least appreciated) is your backup protocol and equipment. In a crisis, a good backup instantly becomes the star of the show. It doesn’t matter if the crisis is a hard drive failure, theft, fire, ransomware, or some other disaster, the one thing … Continue reading Security Tip: Isn’t it time you stopped worrying about backups?
Your router connects your office to the whole wide world, so make sure it’s protecting you. When there’s no trouble connecting, you probably don’t think much about your Internet router. But we at Codestar think about it a lot, because routers can let in hackers. Follow these steps to reduce your risk. Change default credentials … Continue reading Security Tip: Router Protection
Disappoint hackers: Be smart about user IDs. Some of the most effective computer security measures are actually not very high-tech. You can take steps now to protect your information and your organization. In this issue, let’s focus on login IDs. You know passwords are important, but don’t forget that an ID or user name is … Continue reading Security Tip: Be Smart about User IDs