We Take Proactive Security Measures. You Should Too.

When was the last time you changed your password?  

Do you have two-factor authentication set up for your accounts? 

Are you protected against cyber-attacks? 

Are you now slightly panicked because you’re not sure if you’ve done ANY of these things for your business? 

Never fear, Braver is here. 

Our Level 1 Priority Care service includes security protocols and professional recommendations to ensure that you have the best protection available. Based on your industry and daily operations, we develop a security plan that works best for you and your employees. 

Here are just some of the proactive security measures that Braver takes to protect your business, your data, and your employees. 

PS: We follow all these protocols in-house, so you know they’re the best. 

Dual Factor Authentication 

Just like a normal log-in process, two-factor authentication is completed after your username and password are entered. Based on the type of two-factor authentication you are using, you can be prompted to enter a numerical code, provide a thumbprint, or take a photo for facial recognition. It can be a little time consuming to complete each time you want to log in, but the extra level of protection is worth it.  

The main benefit of using two-factor authentication is the extra security because of the peace of mind it provides. If a cybercriminal was able to get ahold of your password, they would have no luck accessing any information because of your unique two-factor authentication code or key. This is especially useful in the case of physical theft of a computer or laptop.  

In addition, you can set up two-factor authentication for your business or personal social media accounts. Two-factor authentication also works well with software applications like Quickbooks or the CRM of your choice.  

Disaster Recovery  

With Braver, you can rest assured that your data is safe and secure with our Ready Vault: Backup and Recovery Service. Our bullet-proof system not only backs up your data as often as every fifteen minutes but in the event of a server malfunction, it can assume the role of that server, while still performing incremental backups. This means your network is still up while your server is being fixed and parts are being ordered. 

To ensure that your data is protected in any disaster, the Ready Vault device encrypts and can archive your data at our off-site data centers incrementally 

 

CyberKnight Security Suite  

Cybercriminals are attacking businesses every day, stealing information and holding companies for ransom. Your information could be out there on the dark web and be used to find vulnerabilities in your network. With CyberKnight Cyber Security Suite we can track, monitor, and close security vulnerabilities while working to reduce liabilities and keep your data safe.  

In a world where everything is connected, it is important to protect your network assets and understand where vulnerabilities lie. Using proprietary technology, CyberKnight Security Suite from Braver Technology reveals vulnerabilities within your business in real time. CyberKnight allows you to make improved security choices for your employees and customers now and in the future.  

For business owners, CyberKnight is the most comprehensive security tool because we provide you with enterprise-level technology and security education at a small business price. 

Password Security and Exchange Policies  

If you are reading this, there’s a good chance that you (or one of your coworkers) has their passwords and login information on a Post-It note taped to their desk.   

While displaying passwords out in the open is unfortunately common in most offices (even the Boston Red Sox are guilty) it leaves you open to data breaches and if you are in the medical field, costly HIPAA violations. We recommend creating secure, complex passwords and that you update them frequently.

We also follow a specific security protocol for password change requests. For our clients, all password changes and other security-related requests must be confirmed by the client’s main contact. This extra security measure is to ensure that all requests are legitimate and that the main contact is aware of all requests for sensitive information. We recommend implementing this security protocol in your own business for sensitive information requests.

This policy is just one of the many that we use to keep data secure, and our clients protected.

If you have any questions about this policy update or any of our security protocols, please contact us.

 

What is Social Engineering and Why Should You Care?

Small business owners may think that while their network and systems are safe from malware, they have nothing to worry about. However, they may not be prepared for social engineering.  Social engineering, a form of cyber crime, is used to steal personal information from users. It goes beyond just phishing scams, using more complex methods to steal information.

Here are some common social engineering scams you should know.

Phishing

This is the most frequently used social engineering attack, especially against small businesses.

How is phishing carried out? Criminals make use of emails, phone calls, or text messages to steal money. Victims are directed to phony websites or hotlines and are tricked into giving away sensitive information. Information like names, addresses, login information, social security, and credit card numbers can all be compromised.

To protect yourself, be wary of emails from people you don’t know that offer you a prize, come with attachments you didn’t request, direct you to suspicious sites, or urge you to act quickly. Phishing emails usually appear to come from reliable sources.

One of the most infamous and widespread examples of phishing was during the 2016 Summer Olympics in Rio, where victims received fraudulent emails for fake ticketing services that stole their personal and financial information.

Tailgating

What’s the fastest and easiest way for criminals to enter a secure office? Through the front door, of course! Tailgating happens when an employee holds the door open for strangers and unauthorized visitors, allowing them to infiltrate an organization. This simple act of kindness enables fraudsters to enter restricted areas, access computers when no one is looking, or leave behind devices for snooping.

Quid pro quo

Here, scam artists offer a free service or a prize in exchange for information. They may lure their victims with a gift or special offer in exchange for login credentials, account details, passwords, and other important information. Or hackers may volunteer to fix their victims’ IT problems to get what they want. In most cases, the gifts or special offers are fake, but damages from stolen information are all too real.

Pretexting

Criminals who pretend to be someone else to steal information. They may pose as a telemarketer, tech support representative, co-worker, or police officer to fish out credit card information, bank account details, usernames, and passwords. The con artist may even convince the unsuspecting victim to apply for a loan over the phone to get more details from the victim. By gaining the person’s trust, the scammer can fool anyone into divulging company secrets.

Despite the many security measures available today, criminals and their social engineering schemes continue to haunt and harm many businesses. So, your best bet is to prepare for the worst. To protect sensitive information, educate yourself and be careful. Remember: If anything is too good to be true, it probably is!

Please contact us to learn more about our cyber security initiatives and how we can help keep your business safe and secure.