{"id":2705,"date":"2022-11-15T12:52:46","date_gmt":"2022-11-15T12:52:46","guid":{"rendered":"https:\/\/listselfstorage.com\/us\/industry-insights\/?p=2705"},"modified":"2022-11-15T12:52:46","modified_gmt":"2022-11-15T12:52:46","slug":"cyber-security-measures-you-need-to-implement-now","status":"publish","type":"post","link":"https:\/\/listselfstorage.com\/us\/industry-insights\/cyber-security-measures-you-need-to-implement-now\/","title":{"rendered":"Cyber Security Measures You Need to Implement Now"},"content":{"rendered":"<p><!-- VideographyWP Plugin Message: Automatic video embedding prevented by plugin options. --><br \/>\n<i><span style=\"font-weight: 400;\">By Shane Carlson, Technology Manager<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">When was the last time you evaluated your cyber security measures?\u00a0 Cyber security entails so much more than just having anti-virus software on your computer &#8211; it requires <\/span><b>knowledge<\/b><span style=\"font-weight: 400;\"> and <\/span><b>attentiveness<\/b><span style=\"font-weight: 400;\">. The tools are important and you need reputable and reliable cybersecurity programs and software, but it is just as important to educate yourself and your team on what you should and should not do.\u00a0<\/span><\/p>\n<p><strong>Cyber Security Practices To Implement<\/strong><\/p>\n<p><em>Encrypt your emails.<\/em><\/p>\n<p><span style=\"font-weight: 400;\">Are we sending sensitive information such as bank information through emails?\u00a0 If so, we need to ensure that we are encrypting those emails.<\/span><\/p>\n<p><em>Read sender addresses and website URLs very carefully.<\/em><\/p>\n<p><span style=\"font-weight: 400;\">Phishing and pharming are becoming more and more advanced to the point that they will completely replicate internal emails and websites in order to acquire your information.\u00a0 Read the sender\u2019s address and website URLs very carefully.<\/span><\/p>\n<p><em>Update passwords regularly.<\/em><\/p>\n<p><span style=\"font-weight: 400;\">Make sure that WiFi passwords are updated regularly, along with your email and other commonly used passwords.<\/span><\/p>\n<p><strong>Practices to Avoid<\/strong><\/p>\n<p><em><span style=\"font-weight: 400;\">Accessing business related platforms on your phone.<\/span><\/em><\/p>\n<p><span style=\"font-weight: 400;\">Do not access business related platforms, such as a property emails address, on a mobile phone unless you have installed protective software on it.\u00a0 Mobile phones are very susceptible to an attack, especially as we usually have outdated and unused applications on them, that make them doorways just as I referenced above.<\/span><\/p>\n<p><em><span style=\"font-weight: 400;\">Keeping unusued and oudated programs on your computer.<\/span><\/em><\/p>\n<p><span style=\"font-weight: 400;\">Are we evaluating our computers for unused and outdated programs?\u00a0 If not, we need to do so, as these old programs are essentially a \u2018doorway\u2019 into your machine that bypasses all of your protection software.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This list can go on and on, but remember that diligence is key, and stay up to date with the current environment in the cyberattack world.\u00a0 Knowledge is your most powerful defense and make sure you pass this knowledge on to your entire team.\u00a0 Finally, one of the most important items to remember is to make sure you and your team are using these methods to keep you own <\/span><i><span style=\"font-weight: 400;\">personal <\/span><\/i><span style=\"font-weight: 400;\">accounts and devices safe too!<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Shane Carlson, Technology Manager When was the last time you evaluated your cyber security measures?\u00a0 Cyber security entails so much more than just having anti-virus software on your computer &#8211; it requires knowledge and attentiveness. The tools are important and you need reputable and reliable cybersecurity programs and software, but it is just as important to educate yourself and your team on what you should and should not do.\u00a0 Cyber Security Practices To Implement Encrypt your emails. Are we sending sensitive information such as bank information through emails?\u00a0 If&hellip;<\/p>\n","protected":false},"author":7,"featured_media":2706,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[22,19,16],"tags":[37,36,24],"gutentor_comment":0,"_links":{"self":[{"href":"https:\/\/listselfstorage.com\/us\/industry-insights\/wp-json\/wp\/v2\/posts\/2705"}],"collection":[{"href":"https:\/\/listselfstorage.com\/us\/industry-insights\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/listselfstorage.com\/us\/industry-insights\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/listselfstorage.com\/us\/industry-insights\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/listselfstorage.com\/us\/industry-insights\/wp-json\/wp\/v2\/comments?post=2705"}],"version-history":[{"count":1,"href":"https:\/\/listselfstorage.com\/us\/industry-insights\/wp-json\/wp\/v2\/posts\/2705\/revisions"}],"predecessor-version":[{"id":2707,"href":"https:\/\/listselfstorage.com\/us\/industry-insights\/wp-json\/wp\/v2\/posts\/2705\/revisions\/2707"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/listselfstorage.com\/us\/industry-insights\/wp-json\/wp\/v2\/media\/2706"}],"wp:attachment":[{"href":"https:\/\/listselfstorage.com\/us\/industry-insights\/wp-json\/wp\/v2\/media?parent=2705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/listselfstorage.com\/us\/industry-insights\/wp-json\/wp\/v2\/categories?post=2705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/listselfstorage.com\/us\/industry-insights\/wp-json\/wp\/v2\/tags?post=2705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}