Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

February 11, 2025 | Susan Napier-Sewell

5 Ways to Prepare for Cyber Attacks

cyber attack

Every week, we’re informed of a heightened alert about cyber attacks and to watch for any accounts being compromised.

The TapRooT® Software team is all over this.

If you’ve ever been the target of cyber attacks, you feel vulnerable and perhaps angry, all the while reporting what happened so the invasion of your privacy will stop. There’s much more you can do.

What can you do to outsmart the hackers and cyber attacks, to stay safe online?

1. Do NOT use a simple password or one that’s very common. That means no use of something simplistic such as “1234,” no addresses where you live or have lived, no use of your names, initials, birthday. In other words, don’t use the basic kind of information hackers can look up and find about you.

2. Use two-factor authentication. Use an authenticator app to log in. You may be sending a text message to confirm it’s you. Sure, it takes a few more seconds. But do you want to be safe or regretful?

3. Trust but verify. Say, you get an email that initially seems to be from someone you know but on further investigation — such as looking at the sender’s email address — you can see it’s someone looking to scam you.

4. Back up data. Did you know every time you delay updating your software, you are putting your data at risk? Those updates we receive a prompt for — they are there to patch a vulnerability we already have, to keep risk away.

5. Never click on a link in a text message or an email that is from a questionable sender. There are a lot of phishing schemes that, at first glance, seem to be from the Social Security Administration or the IRS. Delete. Delete. Delete!

TapRooT® RCA recommends the following modifications to your online behavior to reduce the possibility of cybercrime:

  • Change passwords regularly; be the sole owner of your passwords; avoid using personal information in passwords; create passwords with random keyboard patterns, numbers, and special characters.
  • Don’t respond to emails or messages requesting personal or financial information.
  • Sending your password in an email is a definite no-no.
  • Never give unauthorized persons access to business computers—at the workplace or at home.
  • Don’t interact with money-sending instructions in emails.
  • Always call clients and vendors to verify any financial/billing changes.
  • Choose automatic software updates.
  • Back up data to reduce the likelihood of ransomware attacks, and ensure that your backup management is secure. (Often, a company’s most valuable asset is its intellectual property, so a loss in this area can be disastrous.)
  • Install/maintain antivirus and anti-spyware software and a firewall on all business computers.
  • Secure all WiFi networks and passwords.
  • Educate all employees what comprises business information, and the risks in sharing this with anyone.
  • Grant administrative privileges only to trusted staff and limit employee access to data systems that are workload-critical.
  • Require administrative approval and assistance in any and all downloads by employees.

Image credit: Image by Gerd Altmann from Pixabay .

Circumstances can crop up anywhere at any time if proper and safe sequence and procedures are not planned and followed

We encourage you to learn and use the TapRooT® Root Cause Analysis System to find and fix problems. Register for one of our TapRooT® RCA courses.

We offer a basic 2-Day Course and an advanced 5-Day Course. You may also contact us about having a course at your site. If you need help, reach out at (865) 539-2139.

Categories
Safety, Software
-->
Show Comments

Leave a Reply

Your email address will not be published. Required fields are marked *