As network security specialists, we are obviously big proponents of actions such as installing security patches promptly, setting up firewalls, and regularly running scans with your anti-virus software. These things work together to keep your network and all machines safe from hackers, damage from viruses, and more.  Of course, we are also available to help you establish and maintain proper security protocol.

However, we do want to remind you that malware and hacking are not the only avenues to data theft, stolen identities, and other threats in the digital world. No matter how well you secure your network and computers, your information could be vulnerable if you don’t also address the potential for simple human error.

Would-be data thieves have other ways of gaining access to your information, and they’re surprisingly simple.

Smishing. Smishing is similar to phishing, in that the victim is tricked into giving out sensitive information to the wrong person. These attacks can be operated via phone calls, texts, emails, Skype messages, or even social media messages. The difference is that instead of asking you to follow a suspicious link to a website that records information you enter (or downloads a virus into your system), these criminals simply ask you for sensitive information directly. And you’d be surprised at how many people believe these messages originate from genuine companies or even government agencies!

Real-world threats. Criminals could also gain access to sensitive data, stored on your business equipment like laptops or phones, by simply stealing the device. You might be utilizing those devices only on secured networks, but that won’t help if the device itself is stolen.

So, this is a reminder that no matter how well you have secured your network, your sensitive data (and your customers or clients) are only as safe as your overall security measures allow them to be. We are always available, at 888-RING-MY-TECH, to help you implement proper network security protocol. But remember that security doesn’t stop there. Continue to educate your employees on threats like smishing, theft, and proper password procedures in order to keep your equipment and sensitive information safe.