{"id":2108,"date":"2020-12-31T09:55:41","date_gmt":"2020-12-31T09:55:41","guid":{"rendered":"https:\/\/www.techtodayinfo.com\/?p=2108"},"modified":"2022-12-20T09:54:53","modified_gmt":"2022-12-20T09:54:53","slug":"4-cybersecurity-pitfalls-your-company-should-watch-out-for","status":"publish","type":"post","link":"https:\/\/www.techtodayinfo.com\/4-cybersecurity-pitfalls-your-company-should-watch-out-for\/","title":{"rendered":"4 Cybersecurity Pitfalls Your Company Should Watch Out For"},"content":{"rendered":"\n<p>Unless you\u2019re particularly tech-savvy, taking care of cybersecurity for your business might be a daunting task. But in truth, it doesn\u2019t take a lot to fence up some basic precautions. Here are four common cybersecurity pitfalls that you can protect your company from using simple tools and a bit of common sense.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Weak passwords<\/strong>&nbsp;<\/h3>\n\n\n\n<p>When setting passwords for company accounts, businesses often go with their first association, such as the headquarters address or the CEO\u2019s dog\u2019s name (that actually happened at my former workplace). Passwords like these are familiar and easy to remember for everyone within the organization. The problem is: they\u2019re also very easy to crack.&nbsp;<\/p>\n\n\n\n<p>If you don\u2019t want your passwords to fall prey to hackers, there are some easy steps you can take. First of all, password generators are a life-saver when it comes to protecting your accounts with strong passwords. Using one of these tools, you can generate a high-security unique password of chosen length (the longer the better, though). Always make sure to set a different password for each account \u2013 this will protect you in case one of them gets compromised.&nbsp;<\/p>\n\n\n\n<p>A string of random numbers and characters is hard to crack but also impossible to remember. Password managers like 1Password, KeePass and LastPass will let you access all your passwords with one master key and can be used for the entire organization with the multi-user account. To pick a secure master key, run your ideas through <a href=\"https:\/\/haveibeenpwned.com\/Passwords\" target=\"_blank\" rel=\"noreferrer noopener\">this tool<\/a> to see if they\u2019ve ever been exposed in a data breach before. If yes, it\u2019s better to stay clear of them.&nbsp;<\/p>\n\n\n\n<p>Also Read: <a href=\"https:\/\/www.eccu.edu\/academics\/master-of-science-in-cyber-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">masters in cyber security<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.eccu.edu\/academics\/online-cyber-security-degrees\/\" target=\"_blank\" rel=\"noreferrer noopener\">online cybersecurity degrees<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Free VPNs<\/strong><\/h3>\n\n\n\n<p>As internet privacy concerns have been rising in recent years, VPNs became an incredibly popular tool for people to protect themselves against internet surveillance. VPN, or Virtual Private Network, allows you to encrypt your internet traffic and hide your browsing activity from prying eyes, such as the Internet Service Provider (ISP) or advertisers.&nbsp;<\/p>\n\n\n\n<p>While VPN is great in principle, its popularity led to a flood of fake or malicious VPN services, tempting users with no fees. According to research by Top10VPN, out of 150 most popular free VPN apps for Android, 18 percent tested positive for viruses and malware. And that\u2019s not the only problem. More than half of the apps had intrusive permissions, such as recording via the microphone without users\u2019 knowledge or accessing their contact list. And a quarter of the apps suffered from DNS leaks exposing users\u2019 browsing history to their ISP, which defeats the point of using a VPN entirely.&nbsp;<\/p>\n\n\n\n<p>If your business is using a free VPN, it\u2019s high time to get rid of it and look for a trustworthy VPN provider with a no-log policy. Make sure to do your research and carefully read terms and conditions before you commit. Watch out especially for what types of permissions the provider requests and whether they keep your data logs (they shouldn\u2019t).&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Bad cybersecurity hygiene<\/strong><\/h3>\n\n\n\n<p>The best way to protect your company from dangerous freeware is to educate the team on how to distinguish verified free software that can be useful for day-to-day operations (such as Skype or Dropbox) from a hacker\u2019s bait.&nbsp;<\/p>\n\n\n\n<p>Freeware, or free software, is great as long as it\u2019s actually free. Free from a subscription cost, and free from malware. A common risk is a free software containing malware that can take control of your computer or even lock up important files for a ransom.<\/p>\n\n\n\n<p>Never download anything without doing thorough research on whether the software can be trusted and what the trade-off is for using it free (you\u2019ll often find that the price is your data). Second, keep security programs up-to-date \u2013 make sure both your operating system and web browser are updated to the latest version.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Suspicious and phishing emails&nbsp;<\/strong><\/h3>\n\n\n\n<p>Email attachments can contain all kinds of malware that you\u2019ll unknowingly download on your computer. Most people are careful enough not to open attachments or click links in unsolicited emails, but that\u2019s not the only risk.&nbsp;<\/p>\n\n\n\n<p>Cybercriminals can hack your friend\u2019s or coworker\u2019s email account and send dangerous malware to their entire contact list. If you ever find suspicious attachments in your inbox, even from a reliable source, it\u2019s best to check with the sender if the email actually came from them. If not, they should immediately change their password and notify everyone in their network of the security threat.&nbsp;<\/p>\n\n\n\n<p>Another common email scam is phishing. Hackers may hack into a person\u2019s email to disseminate malware or ask for account credentials. Otherwise, they might set up fake email addresses that resemble an authority from a reputable domain in order to trick you to download an attachment or give up your sensitive information. In this case, it\u2019s important to remember that a legit company would never request your personal information via email nor would they send you an unsolicited attachment.&nbsp;<\/p>\n\n\n\n<p>When in doubt, take a closer look at the email address (if the domain turns out to be paypal14.com instead of paypal.com, you know you\u2019re dealing with fraud) or contact the person or company who allegedly sent the message to verify it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unless you\u2019re particularly tech-savvy, taking care of cybersecurity for your business might be a daunting task. But in truth, it<\/p>\n","protected":false},"author":1,"featured_media":2109,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[147,1021],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>4 Cybersecurity Pitfalls Your Company Should Watch Out For - Tech Today Info<\/title>\n<meta name=\"description\" content=\"4 Cybersecurity Pitfalls Your Company Should Watch Out For. Here are common cybersecurity pitfalls that you can protect your company from by using tools.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.techtodayinfo.com\/4-cybersecurity-pitfalls-your-company-should-watch-out-for\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 Cybersecurity Pitfalls Your Company Should Watch Out For - Tech Today Info\" \/>\n<meta property=\"og:description\" content=\"4 Cybersecurity Pitfalls Your Company Should Watch Out For. Here are common cybersecurity pitfalls that you can protect your company from by using tools.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techtodayinfo.com\/4-cybersecurity-pitfalls-your-company-should-watch-out-for\/\" \/>\n<meta property=\"og:site_name\" content=\"Tech Today Info\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/techtodayinfo\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-31T09:55:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-20T09:54:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techtodayinfo.com\/wp-content\/uploads\/2020\/12\/office-820390_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rose\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechTodayInfo1\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rose\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techtodayinfo.com\/4-cybersecurity-pitfalls-your-company-should-watch-out-for\/\",\"url\":\"https:\/\/www.techtodayinfo.com\/4-cybersecurity-pitfalls-your-company-should-watch-out-for\/\",\"name\":\"4 Cybersecurity Pitfalls Your Company Should Watch Out For - Tech Today Info\",\"isPartOf\":{\"@id\":\"https:\/\/www.techtodayinfo.com\/#website\"},\"datePublished\":\"2020-12-31T09:55:41+00:00\",\"dateModified\":\"2022-12-20T09:54:53+00:00\",\"author\":{\"@id\":\"https:\/\/www.techtodayinfo.com\/#\/schema\/person\/c7640b7cf1ce41c50026ca15a82049c1\"},\"description\":\"4 Cybersecurity Pitfalls Your Company Should Watch Out For. Here are common cybersecurity pitfalls that you can protect your company from by using tools.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techtodayinfo.com\/4-cybersecurity-pitfalls-your-company-should-watch-out-for\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techtodayinfo.com\/4-cybersecurity-pitfalls-your-company-should-watch-out-for\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techtodayinfo.com\/4-cybersecurity-pitfalls-your-company-should-watch-out-for\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techtodayinfo.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"4 Cybersecurity Pitfalls Your Company Should Watch Out For\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techtodayinfo.com\/#website\",\"url\":\"https:\/\/www.techtodayinfo.com\/\",\"name\":\"Tech Today Info\",\"description\":\"Technology Write For Us\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techtodayinfo.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techtodayinfo.com\/#\/schema\/person\/c7640b7cf1ce41c50026ca15a82049c1\",\"name\":\"Rose\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techtodayinfo.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/956b09a06803bc335d817b044dec5ca0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/956b09a06803bc335d817b044dec5ca0?s=96&d=mm&r=g\",\"caption\":\"Rose\"},\"description\":\"Rose is a technology enthusiast and a writer. She had the interest to write articles related to technology, software, Mobiles, Gadgets and many more.\",\"sameAs\":[\"https:\/\/www.facebook.com\/techtodayinfo\/\",\"https:\/\/in.pinterest.com\/ttodayinfo\/\",\"https:\/\/twitter.com\/TechTodayInfo1\"],\"url\":\"https:\/\/www.techtodayinfo.com\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"4 Cybersecurity Pitfalls Your Company Should Watch Out For - Tech Today Info","description":"4 Cybersecurity Pitfalls Your Company Should Watch Out For. Here are common cybersecurity pitfalls that you can protect your company from by using tools.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.techtodayinfo.com\/4-cybersecurity-pitfalls-your-company-should-watch-out-for\/","og_locale":"en_US","og_type":"article","og_title":"4 Cybersecurity Pitfalls Your Company Should Watch Out For - Tech Today Info","og_description":"4 Cybersecurity Pitfalls Your Company Should Watch Out For. Here are common cybersecurity pitfalls that you can protect your company from by using tools.","og_url":"https:\/\/www.techtodayinfo.com\/4-cybersecurity-pitfalls-your-company-should-watch-out-for\/","og_site_name":"Tech Today Info","article_author":"https:\/\/www.facebook.com\/techtodayinfo\/","article_published_time":"2020-12-31T09:55:41+00:00","article_modified_time":"2022-12-20T09:54:53+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/www.techtodayinfo.com\/wp-content\/uploads\/2020\/12\/office-820390_1280.jpg","type":"image\/jpeg"}],"author":"Rose","twitter_card":"summary_large_image","twitter_creator":"@TechTodayInfo1","twitter_misc":{"Written by":"Rose","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.techtodayinfo.com\/4-cybersecurity-pitfalls-your-company-should-watch-out-for\/","url":"https:\/\/www.techtodayinfo.com\/4-cybersecurity-pitfalls-your-company-should-watch-out-for\/","name":"4 Cybersecurity Pitfalls Your Company Should Watch Out For - Tech Today Info","isPartOf":{"@id":"https:\/\/www.techtodayinfo.com\/#website"},"datePublished":"2020-12-31T09:55:41+00:00","dateModified":"2022-12-20T09:54:53+00:00","author":{"@id":"https:\/\/www.techtodayinfo.com\/#\/schema\/person\/c7640b7cf1ce41c50026ca15a82049c1"},"description":"4 Cybersecurity Pitfalls Your Company Should Watch Out For. Here are common cybersecurity pitfalls that you can protect your company from by using tools.","breadcrumb":{"@id":"https:\/\/www.techtodayinfo.com\/4-cybersecurity-pitfalls-your-company-should-watch-out-for\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techtodayinfo.com\/4-cybersecurity-pitfalls-your-company-should-watch-out-for\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.techtodayinfo.com\/4-cybersecurity-pitfalls-your-company-should-watch-out-for\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techtodayinfo.com\/"},{"@type":"ListItem","position":2,"name":"4 Cybersecurity Pitfalls Your Company Should Watch Out For"}]},{"@type":"WebSite","@id":"https:\/\/www.techtodayinfo.com\/#website","url":"https:\/\/www.techtodayinfo.com\/","name":"Tech Today Info","description":"Technology Write For Us","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techtodayinfo.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.techtodayinfo.com\/#\/schema\/person\/c7640b7cf1ce41c50026ca15a82049c1","name":"Rose","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techtodayinfo.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/956b09a06803bc335d817b044dec5ca0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/956b09a06803bc335d817b044dec5ca0?s=96&d=mm&r=g","caption":"Rose"},"description":"Rose is a technology enthusiast and a writer. She had the interest to write articles related to technology, software, Mobiles, Gadgets and many more.","sameAs":["https:\/\/www.facebook.com\/techtodayinfo\/","https:\/\/in.pinterest.com\/ttodayinfo\/","https:\/\/twitter.com\/TechTodayInfo1"],"url":"https:\/\/www.techtodayinfo.com\/author\/admin\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.techtodayinfo.com\/wp-json\/wp\/v2\/posts\/2108"}],"collection":[{"href":"https:\/\/www.techtodayinfo.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techtodayinfo.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techtodayinfo.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techtodayinfo.com\/wp-json\/wp\/v2\/comments?post=2108"}],"version-history":[{"count":6,"href":"https:\/\/www.techtodayinfo.com\/wp-json\/wp\/v2\/posts\/2108\/revisions"}],"predecessor-version":[{"id":4592,"href":"https:\/\/www.techtodayinfo.com\/wp-json\/wp\/v2\/posts\/2108\/revisions\/4592"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techtodayinfo.com\/wp-json\/wp\/v2\/media\/2109"}],"wp:attachment":[{"href":"https:\/\/www.techtodayinfo.com\/wp-json\/wp\/v2\/media?parent=2108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techtodayinfo.com\/wp-json\/wp\/v2\/categories?post=2108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techtodayinfo.com\/wp-json\/wp\/v2\/tags?post=2108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}