Stevens & Stevens advises clients to protect against information theft
From SDB Magazine:
January 6, 2014
Records and information management firm Stevens & Stevens Business Records Management (SSBRM), Tampa, Fla., reminds its clients that while the Internet offers numerous opportunities to search for information, complete transactions and collaborate via email or social networking sites, it’s important to take precautions to protect your personal and business information online.
“Some of the most basic precautions include locking your computer when you step away, using firewalls, antivirus software and strong passwords, installing appropriate software updates and being logical when browsing or using email,” says Marshall Stevens, co-owner of SSBRM, says. “Following good security practices is a key step in safeguarding your information.”
The company suggests that businesses and individuals take the following steps to safeguard information:
- Protect computers – Many employees have access to business computers. Employee access to programs or databases containing sensitive information should be reviewed regularly.
- Choose strong, unique passwords – Ensure account passwords are at least eight characters long and are made up of a combination of numbers and upper- and lower-case letters. Never use the same password for all your accounts.
- Be wary of suspicious information – Trust your instincts. If an email or email attachment seems suspicious, don’t open it. Don’t be fooled by emails asking for personal information and don’t click on unfamiliar links or attachments.
- If it sounds too good to be true, it probably is – Emails promising rewards or monetary gifts are most likely are spam or phishing schemes.
Install updates right away – Since your information could be lost or compromised, backup your information on a regular basis. Your backups will help you identify what has been changed or lost. Database backups should always be stored in a safe, secure area.
SSBRM also advises updating employees on business security policies as well as discussing email and Internet policies, computer network access, how to increase browser security settings and how to deal with suspicious mail or emails.