Posts

3PRIME Recommends Vipre Antivirus Solution for Macs & PCs

For the next several weeks, 3PRIME and we expect many of you, will be activating work from home procedures. A relevant concern is whether the computers your staff may use at home are protected like the ones at your offices.

Cloudflare, a global cloud DNS solution we use for a portion of our client domains, sent 2 interesting statistics yesterday.

  1. As more people work from home, peak traffic in impacted regions has increased, on average, approximately 10%.
  2. In Italy, which has imposed a nationwide quarantine, peak Internet traffic is up 30%.

If you aren’t using a solid antivirus and Internet security suite, we want to share the same recommendation we make for clients experiencing issues with malware on your computers. We have used Vipre Internet Security  for our workstations and laptops since 2012, and in that time we haven’t had to rebuild any workstations due to malware incidents. Prior to this we would have to do this every 6 months or so, a real drag on focus and productivity.

You can protect 10 computers and laptops for $79 per year. Use this link to get the Home Protection package and receive a 20% discount.

Vipre also has several other options, including:

  1. VPN Software
  2. Privacy Shield
  3. Endpoint Security for network administrators
  4. Ultimate Security  package which bundles Privacy shield and VPN with the Home protection license.

While we do not directly support office networks, we’ve found the Home Protection very easy to install and essentially set-and-forget.

Installing Vipre Home Protection

  1. Please use this link to purchase the license for 1, 5 or 10 Macs or PCs.
  2. On that page, choose “Vipre Advanced Security”.
  3. Select the number of licenses you need.
  4. Once you complete the purchase, note your license key.
  5. Download the installation package and install it on each computer.
  6. During install specify the license key.
  7. Complete the installation, including the initial scans.
  8. Setup the scan schedule, we have ours set to run weekly during an evening, but set it to whatever you feel makes the most sense.

How to Start Protecting Yourself Online Today

How to Start Protecting Yourself Online Today 

Whenever we head out the door, we will lock up our homes and keep our pockets zipped up. This is to protect our belongings against any slim chances of theft. However, it’s so much easier to protect your physical belongings than your virtual ones. There are less of them, they can be locked away, you can set an alarm, and we have the advantage of being vigilant about anyone who may be going for our phone or wallet. 

Protecting ourselves online is much harder. All of our data — from login details to personal information to even our buying habits — can be exploited for financial gain. Sometimes you won’t notice the breach because it won’t be your computer that was stolen from, but another business that has your personal data stored away. 

Knowing how to protect your online identity is the first step to protecting yourself online, so follow these steps today:

Go Through and Find Old Accounts 

Old accounts that you don’t use anymore are big security risks, especially if the company has stopped updating their security and are generally running into bankruptcy. In these cases, old accounts are easy pickings for hackers. If that account has personal data like passwords or answers to security questions, you could face a hack somewhere else.

Update All Passwords so They are Unique 

All of your passwords should be unique. Every single one. There are tricks to help you remember all of these passwords or you can invest in a password manager that offers encrypted protection on every account.

Google Yourself 

Old accounts aren’t the only threat to your livelihood. Old posts, news articles — anything that mentions you in a bad light — is something you need to address. On top of Googling yourself, your email, and your phone number, you will also want to go through your old social media posts to ensure that nothing from the past can hurt you in the future. 

The data you need to worry about isn’t just slanderous posts, either. If you publicly mention key data, like where you were born, who your grandmother is and their maiden name, or even what your dog’s name was, then it is a risk. They are answers to your security questions after all!

Use Two-Factor Authentication for Everything 

If two-factor authentication is available, use it. This way you will be required to have your phone or access to another account to login from a new device or computer. 

Encrypt Your Data 

Most laptops will offer the ability to encrypt your data, so if someone steals your computer, they can’t just hack their way in without destroying everything private. This is more necessary for business owners and those whose laptops are worth more than their lives; but, it is still an easy and worthwhile step to take.

Use a VPN 

To protect your search history and online activity you will want to invest in a VPN, especially if you like working in cafes or other public spaces. Free Wi-Fi is easy for hackers to gain access to and hack into your data. 

The level of security you will want to go through will depend entirely on the data you want to keep private. The above list of suggestions can keep your personal data safe from hackers, but if you own a business or work with sensitive data daily, more measures will need to be taken. 

Data Privacy: What is it and How to Protect Your Data?

What is Data Privacy?

Data privacy deals with personal information that is obtained on the web, whether that is personally identifiable information (PII) or personal health information (PHI). It is a branch of data security that focuses on the way that data is handled specifically in regards to consent, notice and regulatory obligations (1). 

Why is it Important?

Data Privacy has become an increasingly important issue for companies to address. Closely held company data is one of a business’ most important assets. Data is useful for mapping company performance, making decisions and solving problems faster, improving overall customer experience and measuring the success of your company (2). It provides market insight and competitive intelligence that can give it an operational advantage in its industry.

Data Breaches has Consequences

There are a variety of ways that a data breach can affect your company negatively. The first that will come to mind to most people is the financial repercussions of the breach (4).

 

These financial repercussions factor in a few different ways:

  • reimbursing affected clients
  • response efforts for breach
  • investigating the incident.

 

A negative impact that is less notable, but equally devastating is the reputation damage it inflicts on your brand. Regaining customer trust is difficult after a data breach. There will likely be customers lost during that time period as people become much more reluctant to use your company (4). These effects may not be permanent, but the time and cost to repair the damage can be significant, so it is important to not overlook the reputational impact data breaches cause.

The Alarming Rate of Data Breaches

Data breaches have become fairly common in this day and age. In fact, in 2018, it was reported that approximately 1.244 billion people in the US had their data breached. These data breaches resulted in 466 million records being exposed. That year, nearly half (46%) of US firms had reported a privacy breach. And making matters worse, 77% of IT professionals said that they did not have a plan if a cybersecurity incident occurred (3)! With nearly half of firms reporting cybersecurity attacks, there must be an increased sense of urgency, seriousness & awareness given to cybersecurity. Better prevention and resolution plans to buffer attacks require such focus and resolve.

How Can You Protect Your Data?

Now that you understand the negative effects a breach can have on your company, how can you prevent them from happening?

 

Here are a few tips to help secure your data:

 

  1. Employee Access & Education – Employees tend to be the easiest (and first) route for cybercriminals to access your data, so making sure that only authorized employees have access to crucial data is important. In addition, educating your employees about data breaches and the steps that they can take to ensure they’re only clicking on secure links and emails is critical (5). 
  2. Backup Servers – Having backup servers that can replicate your data is a good preventative measure. This will prevent large data loss that could occur from a breach (5). Ransomware attacks (where data is forcefully encrypted and held for ransom) can be alleviated when backup servers are employed.
  3. Obtaining Data Privacy Software – There is a variety of different software, like SiteLock, that you can purchase in order to protect your site against data breaches. The software SiteLock detects and automatically removes malware and other infections. It also has the ability to increase web speed by as much as 50%.

Contact us at 3PRIME to protect your website with SiteLock!

 

Data Privacy isn’t just good policy, it’s brand awareness

Data privacy deals with some of the most important personal information that users can provide online. Obtaining this data is extremely useful for companies, as it factors into a variety of different things that help to improve overall customer experience, determine corporate policies, and business operations. The way this information is being stored and protected is essential for companies.

Cyber attacks that resulted in data breaches have become increasingly common, affecting nearly half of US firms. These breaches can have serious effects on a company’s operations and its brand image. 

Make sure that you have preventative measures and solutions in place so that these types of data breaches don’t happen to you! A byte of prevention is worth 1.244 billion people needing a cure!

 

Sources:

www.varonis.com/blog/data-privacy/

www.towardsdatascience.com/how-important-is-data-for-your-business-c15a35c6935e

www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/

www.itgovernance.co.uk/blog/the-damaging-after-effects-of-a-data-breach

www.entrepreneur.com/article/332794