“Data breach can’t happen in our company, we are not big enough to be a target.”
Zinner & Co. Blog and Newsroom
Q: I am fed up and frustrated trying to keep—and remember passwords that are both complex and creative. This is frustrating and I am at my wit's end. What can I do to make it easier for me to remember but more secure against attacks? -Mary Kay C, Business Executive, Brookpark, Ohio
A: Thanks for your question, Mary Kay. Yours is one that almost everyone can relate and you are not alone in your frustration. Fortunately, I may be able to provide some insight and an alternative for you.
Do you remember when you were in school and the teacher would give each student a worksheet to “spot the difference” between two side-by-side detailed scenes? You would look carefully at each of the two images, trying to spot subtle details, such as an extra button on a shirt or a missing shoe on a person. Maybe it was the number of petals on a daisy or a cone of ice cream missing the cherry on top. The directions would indicate there would be six differences, but try as hard as you did, (and even when you asked a classmate for help) you could still only find four or five differences, and were convinced there was never a sixth.
Cybersecurity. What if I said I can give you five security tips you can implement in five minutes that will help greatly mitigate the risk of your home or business computer system from becoming a target for cybercriminals? Yes, it can be that easy!
While there are certainly savvy hackers out there, the reality is many breaches of security stem from common, no-cost proactive measures that most overlook.
Here are our top five:
Zinner & Co. has held steady to many founding principles. The integrity of the firm is supported by a long-held belief to not only to show community support through fundraising events and company sponsorships, but also from a boots-on-the-ground approach.
You have read security warnings advising you to stay away from particular websites and of course, not to click on the link to become the beneficiary of a far-away royal.
You know not to download free apps, to stay clear of file sharing, and are current with anti-virus and firewall protection. Rightfully and confidently, you feel good about the protective steps you have taken to reduce your risk of identity theft. Then - WHAM! Along comes a hacker who successfully infiltrates some of the largest technology companies in the world and as a result, steals your email password.
Related read: Classic Hackers: What War Games taught us about technology in the workplace
I recently read the following news on Forbes.com: