Threats

With the constant barrage of computing attacks and threats on websites and to online security, we’ve developed a section that can serve as your Computing Security Resource Center. Use this site to learn of the latest threats  that are making headlines along with our recommendations on what you can do to protect yourself and mitigate the impact.

We’ll be updating this site regularly so bookmark this page to serve as your go-to place for helpful information.

Date: April 30, 2014
Topic: WordPress DDoS attacks

All of the noise on the internet is on target, but also somewhat blown out of proportion.

Follow the simple steps below and you can ensure that your business is protected.

  1. For a basic list of popular sites and whether they were affected, go to http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/
  2. If you want to check a site to ensure its been fixed for Heartbleed, go to https://lastpass.com/heartbleed
  3. Change passwords for the sites on these lists that you use to ensure any compromised information has been changed.

We also recommend a few basic techniques you should always use to protect yourself and the tools/sites you use including:

  1. Always change your passwords a minimum of once every 3 months. If you have trouble remembering them, use a tool such as LastPass or IPassword
  2.  When setting passwords, always use strong passwords (a minimum of mixed case and one special character and/or number)
  3. For home networks, make sure you’ve changed your router configuration….more than 70% of today’s home routers have default user ids and passwords which can be easily used to compromise your home networks.
  4. For your computer and especially your mobile devices, make sure you have the screen save/password set for the shortest inactivity period possible. Please remember your phone is a homing device, recorder, and camera at the same time. Hacking apps exist which allow nefarious individuals to turn your phone into a device to track you.

Vigilance is your most important ally in protecting yourself against the effects of hacker attacks. Another aspect of protection is choosing software solutions carefully with an eye toward vulnerabilities that arise from decisions you make. I’ll post again soon on this topic as well but for today the steps above should be undertaken immediately to protect your business.

CIOs2GO Blog

June 20, 2015QuickBooks Clinic Series No. 4: Popular Add-ons

In this post I address some of the most popular add-ons to the QuickBooks accounting … Read More

Resources

Eyeglasses and books on the laptopCheck out our Resource Center and discover useful articles, links to relevant industry sites and whitepapers on the finance industry covering topics from strategy to day-to-day operations. You’ll find back issues of the CFOs2GO newsletter “The Issue”, and webcast recordings of talks by our Partners.   READ MORE