Yuma Sun e-Edition

CYBERSECURITY

Businesses can take steps to prevent digital attacks

BY MARA KNAUB SUN STAFF WRITER

Businesses can take steps to prevent digital attacks

IN AN INCREASINGLY high-tech world, ensuring the cybersecurity of a company has become a vital part of doing business.

“Cybersecurity is the act of protecting the digital version of you, your assets and your business. Today, the digital version of you and your business are as important to protect as your physical self,” explained Jason Hitesman, lead programmer at MGM Design, 29 W. 3rd St., a company that specializes in website design.

Both businesses and consumers must protect themselves from cyberattacks. “The most dangerous threats are the most convincing and legitimate-looking emails, websites or even phone calls,” Hitesman said.

“Attacks have become more and more sophisticated and are usually disguised as extremely convincing and

credible-looking communications,” Hitesman added.

John Hessinger, community development director of the Yuma and El Centro Better Business Bureau Serving the Pacific Southwest, also stressed the importance of cybersecurity in today’s business environment, one where working remotely has become commonplace.

“As more of our daily life converts to online, each person is responsible to do their part to protect themselves, their home and their work. Be alert to warning signs like random emails, scrambled links, misspelled words or names, or empty contacts or profiles on social media,” Hessinger said.

“If you have any hesitation, do not interact with the message or email. Stop. Contact the supposed sender, contact your work, confirm as best you can prior to doing anything,” he added.

Hessinger cautioned that these same precautions should be taken at home, by family members, not just at the place of business. “As more and more children and teens

have internet access, it is crucial families sit down and discuss a strategy. Children should report any weird message or email. Parents should monitor and ask if there’s anything like that. Children are naturally curious and open-minded and having a plan can save a lot of hassle,” he said.

Of course, the workplace remains a common target. Therefore, Hessinger noted, “Every employer should confirm with their work’s IT about how company messages or emails will be sent. Find out names, emails and how the company will ask for your interaction. Knowing this can help identify a real request and a cloned account that tricks employees into malicious interactions.”

Businesses can avoid these dangers by taking certain steps. “It has to become a discipline and habit to question the content of an email, phone call or website unless you are absolutely sure of the source,” Hitesman said. “Just take a moment and pause before you click, give information or submit personal data. And to do this even when things look safe at first glance. Remember, the attackers have become experts at making their messaging look real.

Not looking after a company’s cybersecurity can lead to serious consequences. “The smallest opening for a cyber-criminal can be very costly,” Hessinger said.

What can a business do if it falls victim? “It depends on the type of attack. It could be as simple as updating passwords, but it may be necessary to have malicious software removed from your

computer. Or even do a full factory reset. If you have the same password being used on multiple websites be sure to update that password on all accounts,” Hitesman said.

Both Hitesman and Hessinger shared tips on how businesses can look after their cybersecurity. “Every single consumer needs to know the basics of cybersecurity,” Hessinger said. “One, use secure Wi-Fi. Two, protect your passwords. Three, never click a link in any email/ text/social media message from anyone you don’t know.”

Hitesman offered tips that everyone can put into practice right away: “Change your password so every login has its own credentials and passwords are never the same from one website to another. Use a password management system like LastPass to keep track of your logins and auto-generate secure credentials,” he said.

“Have a solid data backup plan running automatically on a daily basis. Use 2-Factor logins whenever possible,” he added.

Both agreed that cybersecurity for businesses is not only about adding layers of security technology, it starts with understanding and managing cybersecurity risks.

Contents

en-us

2022-01-01T08:00:00.0000000Z

2022-01-01T08:00:00.0000000Z

https://yumasun.pressreader.com/article/281595243876759

Alberta Newspaper Group