employee-benefits

4 Tips for Online Accounts Safety

  • employee-benefits

    4 Tips for Online Accounts Safety

There's a lot out there to worry about in the world of cybersecurity, but some of the best steps to take can be the simplest. With just a little more awareness and mindfulness, your business can set a good example for all employees and give them a crucial extra bit of defense where it matters the most.

Right now, it's clear that organizations need to focus on increasing security. At the same time, though, the amount of money spent on this sector could near $1 trillion over the next four years, according to a Cybersecurity Ventures report. With businesses investing more, it helps to find less complicated ways to reach the same goal of asset protections. Below are a few easy tips employees could follow to change their behavior:

 

1. Don't judge an email by its looks

Hackers have learned how to fool targets with emails that look legitimate at a glance. The hope is that the recipient will give it just a look and nothing more, so a good tactic is to look closer and be more discriminating about what links are clicked in the emails.

This means paying closer attention to an email, and looking for anything that might be suspicious, even if the source appears to be a company that employees trust. Shape Security CTO Shuman Ghosemajumder recently spoke to NBC News about the dangerous camouflage of a phishing email.

"It can look just about indistinguishable from an email you would get from one of those services," he said "The way most people vet whether something looks legit is the visual appearance of the email."

To determine authenticity, employees can look closely at the email address, message content and attachments to see if anything looks amiss, while avoiding clicking on anything that might do their account damage.

2. Stop sharing accounts

Since employees can find themselves using different accounts for a single company, sharing usernames and passwords can seem like a time​-saver. Unfortunately, splitting access among users adds risk factors and can also mean that passwords are easier to guess, since multiple people need to use them.

Instead, companies should focus on strict account management. The U.S. Small Business Administration said that managing privileges is another important factor: only the administrators and higher-ranking individuals should have this high level of access. One way the organization recommended this is by assigning specific accounts to each device used in the organization, whether it's a phone or computer.

3. Be aware of problem seasons

While security should always be a high priority, there are certain times when the chance of a scam could be higher than normal. The IRS recently released its annual list of 12 types offraud seen during tax season. Though some of these could potentially happen at any time of year, such as phishing emails and phone scams, the IRS stressed the need for vigilance during the months before April.

If a questionable email or an account alert shows up during this time, then, employees can be doubly aware of the potential threat and flag it as a danger. 

4. Patch the right software and avoid the wrong ones

There are good and bad software updates workers can make. As Tech Times pointed out, the good type of software update involves device operating systems from official sources. Though this could seem like an unspoken rule, major companies can release patches that might slip through the cracks if users aren't aware.

On the other hand, another side of this same principle can be avoiding unauthorized apps. With a clear list of allowable software, businesses can set the rules for what companies permit.

If you’re looking for other ways to help protect your employees, and ultimately your company, Identity Guard Business Solutions may be able to help. With extensive credit monitoring and identity theft protection offered as a voluntary employee benefit. Take the initiative and learn more about Identity Guard as an employee benefit today.  

Resource Center

Resource Center

Join the Conversation