Trolls: How to deal

Cartoonist Ben Garrison posted something “about the Fed” online, says an article at www.vice.com, and this created a firestorm, leading to his billing as the “most trolled cartoonist in the world.” You see, his other cartoons were altered in an offensive way, fooling people into thinking these alterations were his original creations.

11DHow can Garrison climb out of the hole others dug for him? First identify the type of trolling.The vice.com article describes several forms of trolling:

  • Hate speech. This targets anyone other than a white straight man who’s not transgender.
  • Cyberbullying. Targets are often known by the cyberbullies, though I’d like to point out that in this day and age, if you disagree with someone’s comment on an article, you might be called a bully.
  • Trolling. Like cyberbullying, trolling has developed an incredibly broad encompassment, but in its truest form, it refers to anonymous harassing. The basic difference between cyberbullying and trolling is that the target has no way of responding directly to the troller.
  • Griefing. Many people do something little, like send a nasty tweet. The act itself is minor, but when multiplied by all the people repeating it, it creates a huge effect.

After you identify the type of trolling, report it to the social media platform it occurred on.

  • Facebook doesn’t permit online harassment, but this doesn’t mean it can’t be done. If a FB user allows anyone to post on the page, then gee, a hateful message can easily be posted (though the FB user could take it down and block that person after that point).
  • Twitter doesn’t like hateful messages either, but admits that in the past, they stunk at regulating it, though they’ve gotten better, and in fact, will suspend a violator.
  • The Online Hate Prevention Institute runs Fight Against Hate. Report hateful content, then log the report to FAH, and OHPI will track how long it takes the platform to respond. If the platform is lifeless, then FAH can take action.

The third step is to watch for Phoenix pages. The vice.com article defines a Phoenix page as follows: “…a hate speech fanpage or harassing user is removed from Facebook and then immediately creates a new page or account.”

A Phoenix page can pick up steam much faster than the time it takes to remove it. In fact, Facebook was lax at taking down Garrison’s troll pages. Garrison spent “countless hours” trying to get libel removed from Facebook and Twitter. If you’ve been harassed, be on the lookout for if the harasser has been removed—the appearance of re-created pages and users. Report this promptly.

Next step: Report the problem to the police if it’s interfering with your daily life, though I need to point out that I’ve heard of people becoming unraveled simply because someone kept insulting them in some thread.

Also, the police can’t do anything if the harasser is in a different country. In fact, when writer Amanda Hess reported online harassment to the police, he asked her what Twitter was.

It’s best maybe to bypass the local cops and just give the report to the FBI. You can do this through the Internet Crime Complaint Center. Don’t even think about hiring an attorney; you’ll sink time and money. And trying to get money out of the harasser could be like trying to get blood out of a rock.

Rebuilding your tainted reputation is the final step. One way is to put a disclaimer on your site stating that you’re ignoring the trolls. Admit you’ve been trolled. Let people know what’s happening. This approach might make some of the trolls vanish. In other words, don’t “feed the trolls,” as the saying goes.

If you’re able to contact a troller, then do so with the idea of trying to reason with that person. Though this won’t stop all the other trolls, it might help you see them in a different light if you connect with just one of them.

What happened to Garrison and many others was true harassment that marred their reputation. It can affect your business. It can be very serious stuff. But I urge you also not to become overly sensitive to what really amounts to nothing more than name-calling and someone with too much time on their hands spewing nasty comments to you. Don’t get all shaken up just because someone disagrees with your post or even posts the proverbial “your an idiot” (lack of contraction is intended).

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

How to prepare for Digital Disasters

Editor’s Note: In this week’s guest blog security expert Robert Siciliano explains how to protect your IT systems and your business from hardware failure. To learn more, download our new e-book, “5 Things Small Businesses Need to Know about Disaster Recovery.”

3DIt is September and that means National Preparedness Month: an ideal time to get involved in your community’s safety. Make plans to stay safe, and this includes keeping ongoing communications alive. National Preparedness Month culminates September 30th with National PrepareAthon! Day.

I can’t believe that people who heavily rely on a computer for business will still suddenly report to clients, “My computer crashed; can you resend me all the files?” What? Wait!

Why aren’t these people backing up their data on a frequent basis? If your computer is central to your business you should back up your data a minimum of once a day to protect against the following threats:

  • Computer hack
  • Unintentional deletion
  • Theft
  • Water or fire damage
  • Hard drive crash

To make daily data backups less daunting, carefully sift through all of your files to rid old, useless ones and organize still-needed ones. A mess of files with a common theme all over the desktop can be consolidated into a single folder.

Protecting your data begins with keeping your computer in a safe, secure, locked location, but this is only the first (and weakest) layer of protection. The next step is to automatically back up data to the cloud. The third layer is to use local backups, ideally use sync software that offers routine backups to multiple local drives. It’s also important to use antimalware security software to prevent attacks from hackers.

Additional Tips for Small Businesses Make de-cluttering a priority by deleting unnecessary digital files. This will help the computer run faster and help your daily backups run more quickly. Take some time to sift through your programs and delete the useless ones.

It’s also a good idea to clean up your disk regularly. Windows users can find the disk cleanup tool by going to the Performance Information and Tools section under the Control Panel.

Go to the control panel and hit “Hardware and Sound.” Then click “Power Options.” Choosing the recommended “balanced” power setting will benefit the hard drive.

Every two to three years, reinstall your operating system to keep your hard drive feeling like a spring chicken.

The prevention tactics above apply to businesses and really, everyone. Employees should be rigorously trained on proactive security and tricks that cyber thieves use. To learn more about preparing your small business against the common accidents of everyday life, download Carbonite’s e-book, “5 Things Small Businesses Need to Know about Disaster Recovery.”

#1 Best Selling Author Robert Siciliano CSP, CEO of IDTheftSecurity.com is a United States Coast Guard Auxiliary Flotilla Staff Officer of the U.S. Department of Homeland Security whose motto is Semper Paratus (Always Ready). He is a four time Boston Marathoner, Private Investigator and is fiercely committed to informing, educating, and empowering people so they can be protected from violence and crime in the physical and virtual worlds. As a Certified Speaking Professional his “tell it like it is” style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders. Disclosures.

10 Ways our Privacy is invaded

2POnce you become active online…and especially once you become “connected” with a smartphone…your privacy will be in sizzling hot demand—and in fact, you can bet that as you read this, it is already being invaded in ways that you couldn’t possibly imagine. Here are some of those ways, provided by wired.com:

  1. Someone could be collecting information on you via a keylogger: It’s a little tool that records your keystrokes, that someone secretly inserts into your computer. A keylogger, however, can also be deposited by malware that you unknowingly downloaded.
  2. Tracking technology that retailers use. You are in a large department store and must pass through several departments to get to the one you want. Your smartphone is connected during this time. The tracking technology scans your face (or maybe it doesn’t) and connects with your phone, identifying you as a potential customer for the goods that are in the departments you are passing through or near to. Next thing you know, you are getting hit with ads or e-mails for products that you have no interest in.
  3. Video surveillance. This is old as far as the technology timeline, but it is still a favorite among all sorts of people including those with twisted minds. Video cameras can even be hidden in your front lawn. They can also be found at ATMs, placed there by thieves, to record users’ PINs as they punch them in.
  4. E-mail monitoring. Your e-mails could be being monitored by a hacker who has remote viewing capabilities of your computer (because you unknowingly let in a virus).
  5. Personal drones—those small-enough-to-by-held-by-a-child aircraft that are remote controlled; they can be equipped with cameras to take pictures of you, and they can even follow you around.
  6. Public WiFi. Snoops and hackers can eavesdrop on your unsecured WiFi internet with the right hardware and software. Use Hotspot Shield to encrypt your data.
  7. And in addition to these ways your privacy could be invaded, a hacker could be spying on you through the little Webcam “hole” above your computer screen (a piece of masking tape over it will solve that problem).
  8. Peeping Tom. And of course, there is the old fashioned way of intruding upon someone’s privacy: stalking them (on foot or via car), or peering into their house’s windows.
  9. Reverse peephole. A person could tamper with a peephole on a house’s front door, apartment door or a hotel door, then be able to see what’s going on inside.
  10. Remote access technology can be malware installed on your device designed to extract all your sensitive data. Make sure to keep your devices security software updated.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures.

Auto Hacking is a real Thing

You’ll probably be shocked to learn that last year, thousands of cars with keyless entry technology were stolen in London, says a report from wired.com.

10DBut fact is, the more connected a vehicle is to the cyber world, the more hackable the vehicle is—and the hack could be to steal the vehicle or hurt the owner.

Rule: Anything that’s connected, especially via WiFi can be hacked.

The article notes that recently, a Jeep Cherokee was hacked with a smartphone via its Internet-connected navigation and entertainment system; the hackers remotely took control of its steering and brakes while it was on a road.

But don’t panic yet; it was an experiment conducted by good-guy hackers to demonstrate the vulnerability of a connected vehicle. The flaw was corrected after Chrysler recalled 1.4 million vehicles.

But what about getting into keyless-entry vehicles? A device is sold online for $31 that can clone the “key.” The wired.com article notes that BMW, Audi, Mercedes, Saab and Land Rover are among the models at risk.

The thief plugs this device into the vehicle’s diagnostic port. The information collected is then used to reprogram a blank fob that can start the vehicle—after the thief smashes a window to get in.

To deal with this, car makers are trying to create a key whose signal is harder to copy. Security experts point out that vehicles need additional layers of protection such as encrypted communication between them and the Internet.

The Jeep mentioned above was hacked via its navigation and entertainment system, forced to go into a ditch. But another thing a hacker could do is spoof the GPS signals that emanate from satellites, and transmit altered directions to the driver, making that person go way off course. Imagine someone doing this as revenge, perhaps on his nasty boss from work.

Or they can sit back and laugh while they create traffic jams. But it won’t just be fun and games for all hackers. Imagine what terrorists or psychopaths could do. And it’s all very possible. University of Texas researchers actually steered a super yacht off course, unknown to its captain.

Hacking into cars will be even more feasible as cars become closer to being driverless, because this feature will be dependent upon being connected.

Pay close attention to any manufacturer recalls or updates that may involve a patch to correct any vulnerabilities.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention.

Catfishing Scammer tells all

Catfishing is when someone creates a phony online account—and not necessarily to scam someone for financial gain. An article on vice.com tells all about a person who’s been catfishing for eight years.

9DShe started in middle school by creating “Joey” on MySpace. She then commented, as “Joey,” on her real MySpace page to make herself appear that some cool kid named Joey thought she was pretty.

She got older and didn’t have friends. Don’t blame her for this. Her mother was an addict and father behind bars. She wanted friends, but years of abuse impaired her ability to integrate with people—as herself.

So she created more fake accounts, to create the self she wanted to be. She snatched photos of a cool-looking girl on MySpace and created an account for “Amanda Williams.” The common name would make detection of catfishing impossible.

Because Amanda’s photo was stunning and her account presented with confidence, many people began adding her and sending flattering messages and friend requests.

Our girl here spent loads of free time on social media, constructing Amanda’s life. (Can you see how it’s believable that many adults do this with Facebook? There’s even a site where you can hire a Photoshop specialist to alter and beautify your headshot for only five bucks, and shop you onto a galloping horse or a sailing boat.)

One day our girl, posing as Amanda, messaged a classmate that Amanda liked her, figuring that this would get out and make the other kids think she was cool if Amanda liked her.

But she got busted because it was discovered that Amanda’s phone number was the same as hers.

Then she was hooked on catfishing, and this awful experience only taught her to be more cunning. So she created a new account—with the same photos used for Amanda Williams (not a bright idea), but she blocked her classmates.

After ninth grade, she was transferred to a vocational school due to bullying. All free time was spent on social media doing you-know-what.

More clever this time, she gradually added about 150 “filler friends” to make the account look legitimate, then began adding desired friends. She’d steal photos from Facebook and then block that person’s friends to avoid getting busted.

She then created subaccounts to add to the authenticity. This was done by taking Instagram videos and posting to Facebook. She used Photoshop to fake the “proof” signs.

The phony Amanda Williams account, studded with stolen photos, backstories and fake friends, made our unfortunate girl feel validated. But to her, the fake friends of Amanda Williams were real enough to “speak” to. Those made-up friends cared about her. They were more real to her than people in real life who didn’t care.

She even managed to lasso a cyber relationship through Amanda Williams, but her conscience won out and she fessed to the young man the truth. He vanished after that. But it haunts her because she wonders if she could have accomplished this without Amanda.

She admits to being addicted to catfishing for attention, which has prevented her from working on relationships with real people in person. She’s created more than 20 fake accounts thus far, excluding the subaccounts, which perhaps total 200. But she claims all of this has been therapeutic, though at the same time, heartbreaking.

Today she’s 21 and still friendless in real life. She’s never been employed. But she admits to how wasteful this addiction has been. She hardly leaves the house due to social anxiety; her reality is inside her computer.

She’s in therapy, though, and only one of the fake accounts is active. She can’t part with it. “My existence hinges on this fake account,” she says in the vice.com article. She raised Amanda as her child, giving her new hairstyles, even. Amanda grew up, but her creator is still crippled inside a cocoon.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention.

Summer of Home Invasions

Even three men in a house aren’t immune to a home invasion, as was the case in Bedford, Massachusetts recently, says a report at boston.cbslocal.com.

2BThree men broke into the apartment’s second floor at 2 a.m. and attacked the three male occupants. Three men, especially when one has a gun, really don’t care what gender the occupants are. In fact, one of the residents was shot in the leg, and the three intruders are on the loose.

However, police report that at least one of the intruders knew the victims, who might have been targeted for a bad drug deal or just for a robbery. This is the first shooting in Bedford in at least 10 years.

Another home invasion recently took place in Minneapolis, says www.kare11.com. This one had a far more tragic outcome than the one above. Susan Spiller, an artist and community activist, was killed by her home intruder, who apparently forced his way in. The thug, however, spared the life of Spiller’s greyhound.

Police may never know how he got in or if he even knew the victim. It’s not known if she answered the door and that’s when he forced his way in, or if in some other way forced open a door or window.

In Spencer Township of Michigan, a man invaded a home and murdered a man, says www.freep.com. Recently, the killer, Isaac Fezzey, 22, was convicted of his crime and will get life locked up. Fezzey and several other masked men forced their entry upon the home, seeking thousands of dollars related to a drug deal that they thought was inside.

They forced Brent Luttrell, 34, into a vehicle, then shot and stabbed him, then dumped his body onto a road. One of the invaders was sentenced last month, and two are facing trial in the near future.

Though two of these invasions may have been related to drugs, that in no way takes away from the brutality of home invasions. A drug dealer or buyer who’s owed money for a drug deal, who shoots and stabs someone involved with the deal and then dumps the body along a road, is certainly quite capable of forcing himself into your grandmother’s home, tying her up, robbing her and then shooting.

Lock up. Get a home security system.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

Work from Home isn’t the Scam It used to be

Many, including me, have reported for years about all the “work at home” scams. And frankly, there are still plenty out there, unless you know where to look. There has never been more opportunity to legitimately earn a living working at home, and NOT get scammed.

12DMothers with young kids aren’t the only ones working at home (telecommuting) these days. The “WAHMs” have lots of company.

The Internet has allowed people of all ages and educational levels to do this, including retirees. Many online jobs are linked to legitimate companies that have made provisions for the telecommuting.

  • More and more companies are recognizing the cost savings of setting up telecommuting positions.
  • Telecommuting boosts morale and thus, productivity, which includes increased work duration.
  • Positions involving 100 percent telecommuting often mean making up ones own schedule. There really is no limit to the flexibility telecommuting allows.
  • The definition of “telecommuter” traditionally has been that of someone employed full-time by a business but spends at least 50 percent of worktime at home. Nowadays it refers to even working just one day a week at home. Telecommuting also refers to the entrepreneur, such as the prolific blogger.
  • “Telecommuting” also encompasses working at home beyond the 40-hour work week onsite, such as making reports and answering e-mails in the living room.

Telecommuting may not be for everyone. But more and more people are finding it to be the only way they want to make a living.

Possible Drawbacks

  • Limitations in face-to-face contact with coworkers and clients, though Skype helps. For many, this is a non issue.
  • Lack of a centralized location for companies in which the entire workforce is remote. Who cares! You don’t want to leave your home and fight traffic anyway!
  • Inability to monitor activities of other personnel. It’s better to be your own boss and not have to manage people, trust me on that.
  • Fewer promotions. Just go into it knowing you can always change positions and still make more $$ with different job descriptions.
  • Loneliness. I’ve never found this to be an issue.

Additional Benefits

  • Significant savings in money: gas, repairs on car from wear and tear, parking fees, wardrobe, childcare, dog sitter or doggie daycare
  • Healthier eating (no vending machine runs)
  • Being able to help with sudden family matters
  • Not being exposed to workplace hostility or other problems such as the nearby coworker who keeps whistling or popping gum, or the employee with the foul body odor
  • The employer saves a lot of money (no office space).

Security Concerns

  • Telecommuters who allow other family members to use the work computer; this opens the door to infections or accidentally leaking company information.
  • The work computer should be off-limits to all other use, even if it seems harmless such as shopping or perusing Facebook.
  • The telecommuter’s household should have at least one other computer for all other use including e-mail accounts.
  • The computer should be located in a secure, private area of the house so that nosy family members or visitors don’t gain access to company information.
  • Storing work related data in a public cloud service; all data should be stored in a backup that’s part of the company network.
  • There may also be some risk in storing company data on a flash drive (it can be lost and eventually found by the wrong person).
  • The telecommuter takes the computer to a public Wi-Fi spot and uses it there, where data can be “seen” by snoops and hackers.
  • Using an unsecure Wi-Fi at home. The worker must make sure that the home Wi-Fi is secure.
  • The employee should never tinker with the company’s administrative and security settings.

All in all work at home is a viable and safe option for anyone who recognizes both the pros and cons, (mostly pros).

Robert Siciliano is a Personal privacy, security  and identity theft expert to Arise discussing identity theft prevention. Disclosures.

Opportunities in Government for Skilled Security Personnel

As recent data breaches have shown, cyber attacks are particularly threatening to government entities handling sensitive data like Social Security numbers. Unfortunately, state agencies struggle to hire cybersecurity professionals.

The cause of this staffing shortage? There simply aren’t enough qualified people for the job[i]. Thankfully, change is in the air.

To attract skilled cybersecurity experts, some state governments are expanding IT internships for high school and college students. Many are offering more money, telecommuting jobs and flexible hours in hopes of landing the right candidates.

Some challenges states face in the hiring of skilled IT staff include:

  • Recruiting new workers to fill vacant IT slots
  • Offering competitive salaries to entice skilled professionals from the private sector
  • Filling senior-level IT positions quickly
  • Retaining skilled employees and minimizing turnover

One novel approach is “cross-training” talent: state governments have begun rotating cybersecurity employees through different positions to improve skills quickly. Like an endurance athlete cross-training with weight lifts and short sprints, exposure to different kinds of threats, networks, technologies and security strategies rapidly builds expertise among IT professionals and provides meaningful training for young hires. Cross-training can help improve retention while bolstering a state’s digital security apparatus.

Aspiring cybersecurity professionals should explore options in the public sector. Government employment offers a meaningful, multidisciplinary approach to continuing your cybersecurity journey.

I’m compensated by University of Phoenix for this blog. As always, all thoughts and opinions are my own.

[i]  http://www.bls.gov/opub/btn/volume-2/careers-in-growing-field-of-information-technology-services.htm

Work at Home Environment is a Safe, Secure Solution

There was a time when online dating was a novelty, perceived as unsafe. Today, 59 percent of people agree that online dating is a good way to meet others (Pew Research, 2015). In fact, it’s the preferred method of matchmaking. A different online environment with similar views from the public is working from home. People who want to work at home fear its safety and security, understandably. But working from home is already a safe and secure proposition as far as finding a job and creating a safe environment in your home.

12DStart with reputable “outsource” companies.

Avoid the potential of being scammed. Outsourcers are the companies that agents form partnerships. The big, well-known organizations that want the best people at its frontlines go to outsourcers that have already vetted work at home agents. Additionally, outsourcers that provide work at home opportunities often provide clients with secure platforms and the best tools necessary for both agents, clients and customers to be successful in their interactions. Outsourcers often provide the most legitimate telecommuting opportunities. One such provider is Arise Virtual Solutions.

Customer service jobs.

Think of companies that have big customer support departments. Many have opportunities for working at home because, as you may have guessed, this saves companies money. However, work at home opportunities also bring forth an agent who is highly motivated, has a specialized skillset, and provides enhanced customer experiences. Outsourcers work across industries from energy to credit card companies and everything in between that field customer inquiries all day (and night) long.

Do your research to find the right opportunity.

Work-at-Home Sites

These sites specialize in work-at-home listings or leads. Make sure that the site you use has an explicit screening policy to filter out scams. Read about the website itself before diving into the listings. Realize that the listings on these sites may simply be links to other legitimate sites that have listings, rather than a straight path to an opportunity.

Work-at-Home Forums

Here you’ll find what other telecommuters have to say, including their warnings. You may even create a thread to start a discussion or ask for help.

How to Ensure Your Home Workplace Is Safe, Sound and Efficient

Now that you’ve taken the leap and found that perfect work at home solution, it’s time to create a safe and productive environment in your home to get to work.

It is likely the outsourcer you partner with will make numerous recommendations in regards to a safe and comfortable working environment. And, they will want to make sure you are legitimate in regards to your credibility and commitment. Expect to learn and take courses to succeed; you may even pay for courses. Expect to pay for a background check.

To get started they will most likely request fundamentals like effective hardware (computers and telephones/headsets) and software (security software, VPNs, call center software) and basic requirements like a comfortable chair and quiet setting.

The following are a few things to consider:

  • Make the workstation quiet and free of distractions (internal and external). Think: young kids or baby, sick family member, new puppy, home construction, neighbor’s incessantly barking dog, party next door etc.
  • Make the room temperature comfortable considering windows may need to be closed.
  • Avoid tripping hazards by keeping cords under a desk or secured along the wall.
  • Establish an escape route from the work room should there be a fire or other disturbance.
  • Think home security. Never leave the window open if you’re gone from the room for extended periods. Consider installing a home security system.
  • Keep the work room clean, void of clutter and flammable substances. Don’t smoke in it.
  • Don’t eat at your computer. Keep liquids in spill resistant containers.
  • The computer should be connected to a surge protector.
  • Make sure the workstation is ergonomic including a great chair with good back support or a backless ergo chair.
  • Never be in your chair for longer than one hour at a time. Ideally, take five-minute movement breaks out of the chair for every 30 minutes spent sitting. Consider getting an alternate stand up desk.
  • Use a headset and a quality phone.

It’s really not that complicated. If the job doesn’t directly involve hands on work, tools, or face to face involvement, then for the environment and quality of life, work at home and telecommuting is the best option.

Robert Siciliano is a Personal privacy, security  and identity theft expert to Arise discussing identity theft prevention. Disclosures.

Human error is inevitable: Here are some ways to protect your business

National Preparedness Month is happening right now. It’s the perfect time to take action for you and your community. It’s all about making plans to remain safe, and when disasters do strike, to keep communications going. September 30th is the culmination of NPM, with the National PrepareAthon! Day.

3DIf a burglar sees your Facebook status that you are traveling on vacation and then enters your house, and takes $10,000 worth of valuables, it’s safe to say you as the homeowner facilitated the theft. This is no different than leaving your doors unlocked when you head to the store. This lack of attention to security is why crime often happens.

These lapses in judgement are akin to how human error enables data breaches. Even worse, for a small business, employee behavior accounts for a significant number of hacking incidents – and the costs of data breaches are tremendous.

A study from CompTIA says that human error is the foundation of 52 percent of data breaches. The CompTIA report also says that some of the human error is committed by IT staff. Funnily enough, it also points out that typically, businesses rank human error pretty low on the priority list of potential problems.

Some important things to remember:

  • Security awareness training is crucial for employees.
  • A strong incident response system must be in place.
  • Appointing a CISO (chief information security officer) will also help.

The high price of human error can include lost or stolen mobile devices, slow notification of a data breach, a weak security structure and response plan, and lack of a CISO. To avoid these and protect your business, you should:

  • Implement an aggressive security awareness training program for employees
  • Develop a data breach response plan
  • Implement strong authentication practices
  • Use encryption
  • Implement a data loss identification system

And all companies should take note of the following safeguards:

  • Vigorously train employees in safety awareness that pertains to the “bring your own device” policy. Many data breaches occur when someone conducts business on their personal mobile device.
  • Security awareness training isn’t just about telling employees the facts. It also should include staged attempts at a data breach (by hired white hackers) to see who takes the bait. This also includes staged attempts by people posing as vendors or other executives trying to gain access to sensitive information.
  • Back up all data on a frequent basis, ideally on a local drive in combination with a cloud service.
  • Computers should be replaced every two to three years. This will make it easier for businesses because the computers at this point will still be functioning.

The prevention tactics above apply to businesses and really, everyone. Employees should be rigorously trained on proactive security and tricks that cyber thieves use. To learn more about preparing your small business against the common accidents of everyday life, download Carbonite’s e-book, “5 Things Small Businesses Need to Know about Disaster Recovery.”

#1 Best Selling Author Robert Siciliano CSP, CEO of IDTheftSecurity.com is a United States Coast Guard Auxiliary Flotilla Staff Officer of the U.S. Department of Homeland Security whose motto is Semper Paratus (Always Ready). He is a four time Boston Marathoner, Private Investigator and is fiercely committed to informing, educating, and empowering people so they can be protected from violence and crime in the physical and virtual worlds. As a Certified Speaking Professional his “tell it like it is” style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders. Disclosures.