Search

Cybersecurity Best Practices

Enable Two Factor Authentication (2FA)

Also called multiple-factor or multiple-step verification, it’s an

authentication mechanism to double check that your identity is

legitimate. It requires two verification factors, a password and a

second factor, usually an authenticator code on a mobile device

to login. This ensures that a hacker cannot gain access to your

account with only a password.


Virtual Private Network (VPN)

VPN encrypts your network traffic as it’s transported across

shared or public networks. This protects your data against

hackers who routinely monitor open networks for opportunities to

obtain passwords and critical data


Apply Updates

Always make sure your operating system and applications

are up-to-date with security patches and hot fixes. Microsoft

releases updates about once a month and it’s a very good

practice to keep current. If you have any computers running an

old operating system, such as Windows 7, upgrade it

immediately.


Install a Firewall

A firewall is a network security device (or software) that monitors

incoming and outgoing network traffic and decides whether to

allow or block it, based on defined security rules. If you address

nothing else, implementing a firewall is perhaps the single most

effective thing a small business can do to decrease their risk of attack.


Enforce Strong Password Policies

Create rules that require passwords or pass-phrases that are at

least 10 characters long and contain a combination of letters,

numbers, special characters and upper & lower case. The more

complex your password, the harder it is for a hacker to find it.


Change the Default Router Password

Default router passwords are designed to be easily remembered

and readily available to installation technicians for quick setup.

Changing the router default password is similar to buying a house

and changing the locks.


Use Ethernet Instead of WiFi when Possible

In theory, wireless networks are less secure than an Ethernet

connection. Because wireless communication travels through the

air, it's easier for hackers to gain access to your data. Ethernet-based

connections are considered more secure, since there is a

direct connection between your data and the Internet.


0 views

CONTACT US

Have a Question or Need Quick Help?

Send us a message or use the chat function and a technician will jump right on it. Our technicians are available 24x7, after hours and on the weekends to respond to emergencies.

Use this form to sign up for our weekly newsletter.

HEADQUARTERS

575 Fifth Avenue, 15th Floor

New York, NY 10017

REGIONAL OFFICE

3801 PGA Boulevard, Suite 600

Palm Beach Garden, FL 33410

info@roarktechservices.com​

(212) 682-5555

linkedin-white.png
twitter-white.png
facebook-white.png
instagram-white.png

@copyright Roark Tech Services 2020

linkedin-white.png
twitter-white.png
instagram-white.png
facebook-white.png