When was the last time you changed your password?
Do you have two-factor authentication set up for your accounts?
Are you protected against cyber-attacks?
Are you now slightly panicked because you’re not sure if you’ve done ANY of these things for your business?
Never fear, Braver is here.
Our Level 1 Priority Care service includes security protocols and professional recommendations to ensure that you have the best protection available. Based on your industry and daily operations, we develop a security plan that works best for you and your employees.
Here are just some of the proactive security measures that Braver takes to protect your business, your data, and your employees.
PS: We follow all these protocols in-house, so you know they’re the best.
Dual Factor Authentication
Just like a normal log-in process, two-factor authentication is completed after your username and password are entered. Based on the type of two-factor authentication you are using, you can be prompted to enter a numerical code, provide a thumbprint, or take a photo for facial recognition. It can be a little time consuming to complete each time you want to log in, but the extra level of protection is worth it.
The main benefit of using two-factor authentication is the extra security because of the peace of mind it provides. If a cybercriminal was able to get ahold of your password, they would have no luck accessing any information because of your unique two-factor authentication code or key. This is especially useful in the case of physical theft of a computer or laptop.
In addition, you can set up two-factor authentication for your business or personal social media accounts. Two-factor authentication also works well with software applications like Quickbooks or the CRM of your choice.
With Braver, you can rest assured that your data is safe and secure with our Ready Vault: Backup and Recovery Service. Our bullet-proof system not only backs up your data as often as every fifteen minutes but in the event of a server malfunction, it can assume the role of that server, while still performing incremental backups. This means your network is still up while your server is being fixed and parts are being ordered.
To ensure that your data is protected in any disaster, the Ready Vault device encrypts and can archive your data at our off-site data centers incrementally
CyberKnight Security Suite
Cybercriminals are attacking businesses every day, stealing information and holding companies for ransom. Your information could be out there on the dark web and be used to find vulnerabilities in your network. With CyberKnight Cyber Security Suite we can track, monitor, and close security vulnerabilities while working to reduce liabilities and keep your data safe.
In a world where everything is connected, it is important to protect your network assets and understand where vulnerabilities lie. Using proprietary technology, CyberKnight Security Suite from Braver Technology reveals vulnerabilities within your business in real time. CyberKnight allows you to make improved security choices for your employees and customers now and in the future.
For business owners, CyberKnight is the most comprehensive security tool because we provide you with enterprise-level technology and security education at a small business price.
Password Security and Exchange Policies
If you are reading this, there’s a good chance that you (or one of your coworkers) has their passwords and login information on a Post-It note taped to their desk.
While displaying passwords out in the open is unfortunately common in most offices (even the Boston Red Sox are guilty) it leaves you open to data breaches and if you are in the medical field, costly HIPAA violations. We recommend creating secure, complex passwords and that you update them frequently.
We also follow a specific security protocol for password change requests. For our clients, all password changes and other security-related requests must be confirmed by the client’s main contact. This extra security measure is to ensure that all requests are legitimate and that the main contact is aware of all requests for sensitive information. We recommend implementing this security protocol in your own business for sensitive information requests.
This policy is just one of the many that we use to keep data secure, and our clients protected.
If you have any questions about this policy update or any of our security protocols, please contact us.