Is It Safe to Use Open Public Wi-Fi Hotspots?

A man on a computer that is on public wifi. The wifi is a trap

Is It Safe to Use Open Public Wi-Fi Hotspots?

With data breaches increasing by the day, it is imperative to keep business and personal information safe and secure. Those who don’t take the necessary precautions risk losing their proprietary and personal data to criminals. Loss of proprietary and personal data can have far-reaching consequences, both for individuals as well as businesses. Apart from financial losses, businesses also risk taking a hit to their reputation.

There are several aspects to data security, and one of the growing areas of concern is mobile security. With the mobile device use prevalent and the practice of bring-your-own-device (BYOD) to the workplace becoming more prominent, it is vital to understand the risks associated with mobility.

Is it safe to use the internet from open public Wi-Fi hotspots?

If you are using an open public Wi-Fi hotspot, you need to be careful. We will take you through what you need to do if you have to use an open public Wi-Fi hotspot – why IT security experts consider public Wi-Fi risky, how to stay safe when using public Wi-Fi, and how a virtual private network (VPN) operates.

Why is public Wi-Fi considered risky?

You don’t think twice when using the internet from your home or office because you know the connection is secure. But that is not the case when you use public Wi-Fi. Therefore, before you start surfing the internet from an open public Wi-Fi hotspot, it is important to know why public Wi-Fi is considered risky.

When you access the internet from public places like airports, hotels, restaurants, shops, etc., you are using public Wi-Fi. We are so used to using these hotspots that we don’t even think twice before connecting to them. While it is fine to connect to public Wi-Fi for checking your social media accounts, you need to think twice before checking your emails or accessing your bank accounts.

There are numerous risks involved if you are using public Wi-Fi. While it might be necessary to brief your team in the office or provide prompt service to your customer, it is vital to understand that these networks offer almost negligible security. That is the reason you need to be careful.

Here are some of the risks of public Wi-Fi, as covered by Norton:

Man-in-the-middle attack –One of the most common threats on public Wi-Fi networks, a man-in-the-middle attack is similar to eavesdropping. When you connect your device to the internet, data from your computer goes to the website or service you access, and it is here that a third person can exploit the vulnerabilities in-between. That means, your private connection is no longer private, and a third person can access your data.

Unencrypted network – When you opt for encryption, the information you send from your computer to the wireless router gets encrypted. It means, the information you send gets coded, and only those having the key to deciphering the code can read the information. In most cases, as a default setting, the encryption is turned off when the router leaves the factory. To enable the encryption, you need to turn it on during the time of the network setup. But if a non-IT person sets up the network, there is no guarantee that he or she turns on the encryption. So, you don’t have a way to find out whether the public Wi-Fi you are using has encryption turned off or on. And, this is again dangerous as the information you share on unencrypted networks is not safe.

Malware distribution – By exploiting the software vulnerabilities, attackers can slip malware on to your computer. A security vulnerability is a security loophole that exists in an operating system or software program. It is easy for hackers to exploit this weakness. They can write a code to target a particular vulnerability and inject the malware on to your device. Your data is at risk if your device gets infected with malware.

Snooping and sniffing – Snooping and sniffing is again a very common risk on public Wi-Fi. Hackers use special software kits and devices that allow them to eavesdrop on Wi-Fi signals. With this technique, hackers can access all your online activities. From the websites you visit and the information you leave on the webpages to getting hold of your login credentials and hijacking your accounts, the attackers get every bit of information they want.

Malicious hotspots – Malicious hotspots are rogue access points that can trick you to connect to them because their name is almost similar to a reputable brand. For example, if you are staying at a Holiday Inn and want to connect to their Wi-Fi network, but you accidentally connect to HoliDay Inn, which is a malicious hotspot. When you connect to this rogue hotspot, attackers can view all your sensitive information.

Staying safe when surfing public Wi-Fi

There are occasions, however, when you have to use open public Wi-Fi.

So, what should you do?

Here is what you can do to stay safe when surfing public Wi-Fi.

Always try to use a trusted Wi-Fi network – It is vital to understand that it is difficult for any public Wi-Fi network to provide foolproof security. That is why it is important to try to connect to a trusted entity like Starbucks. Public Wi-Fi networks like Starbucks are less suspect than an unknown entity. As Wired observes, they’re already profiting from your presence there. Avoid connecting to an unfamiliar network, and when traveling to a new place, always try to connect to known and trusted networks.

Follow Google’s advice – use only HTTPS sites – Google Chrome tells you whether the site you are visiting uses an unencrypted HTTP connection or an encrypted HTTPS connection. For HTTP sites, you can see “Not Secure” on the search bar. Be aware that Chrome is the only web browser that provides this warning.

Try not to use HTTP sites from an open public Wi-Fi network because these are not secure. On secure sites , it is difficult for attackers to access your data that travels between your computer and the website’s server. 

Don’t share too much information – If you have to use an open public Wi-Fi network, make sure that you don’t share all your details. Try not to forget the first rule (using a trusted network), but in case you have to use an unknown network, don’t share all your details, such as email address and phone number. Also, avoid signing up for multiple public Wi-Fi networks. It is better to connect to a network that you are already registered with.

Make sure you limit file sharing – While using an open-public Wi-Fi network, ensure that you turn off the seamless file sharing option on your device. For example, if you are using a PC, go to the Network and Sharing Center, then to the Change Advanced Sharing settings, and then turn off the File and Sharing option. If you are using a Mac, go to System Preferences, then go to Sharing, and then unselect everything. After this, go to Finder, then click on AirDrop, and then select Allow me to be discovered by: No One. And, in case you are using iOS, go to the Control Center and find AirDrop, and then turn it off. If you do this, you can keep your files safe because attackers will not be able to get hold of your files, nor can they send you unwanted stuff.

Read the terms and conditions of the network you are signing for – Not an easy thing to do, but if possible, you should check for red flags. When you go through their terms and conditions, you can get to know the type of data they collect during the session and what they intend to do with it. You can do a web search for terms you don’t understand. However, make sure that you don’t promptly install any software the open Wi-Fi network suggests.

Always use a VPN – The best way to protect your data on an open public Wi-Fi network is to install a VPN on your device. When you use a VPN, it encrypts data that you receive or send through a secure server, which means people on the network cannot spy on your data.

How does a VPN work?

Using a VPN is the best way to protect your data on an open public Wi-Fi network.

A VPN disguises your actual IP address and location. It uses encryption and establishes a private, secure channel for your internet use. If you use a VPN, all of your information moves securely from your location to the VPN, your original IP address is masked, and your data exits to the public internet through the VPN server. The use of a VPN makes it extremely difficult for the attacker to trace the data back to you.

The use of a VPN is particularly of help to businesses that need to give their employees remote access to the company server. You can get access to the software and company resources even when you are not in the office.

So, to answer the question, you can safely use Wi-Fi hotspots if you exercise caution and common sense — as well as add the extra layer of protection that a VPN affords. Be aware that this is a less-than-ideal situation, but if it can’t be avoided, we’ve hopefully provided the information you need to identify sketchy hotspots and protect yourself as best as possible. As we always say, knowledge is power!

No matter what platform your company uses to meet its unique needs, DocuServe specializes in offering industry-leading solutions for keeping your digital content safe. Our secure document and rich media sharing app can reduce the risk of data exposure. With DocuServe, you can easily control content distributed to employees, vendors, and potential customers. Contact us to learn more.


Cloud Storage

How Well Could Cloud Storage Perform for Your Business?

Globally, cloud computing is being embraced by businesses at a rapid pace. Cloud computing uses a network of remote servers hosted on the internet to store, manage and process data instead of a local server. The growth in the cloud computing vertical has gained traction because it provides on-demand computer system resources – such as data storage and computing power – without the bother of active maintenance and management by the user.

In addition to cloud drives, data analytics helps businesses become more effective by allowing them to store, interpret and process big data to help understand the needs of their customers. Businesses that use data analytics don’t have to resort to guesswork, because data patterns can systematically be analyzed to plan effective business strategies.

Why would your business consider cloud storage?

Data analysis helps businesses because it allows them to recognize patterns in a set and predict what to expect in the future. Referred to as data mining, it helps businesses discover patterns in data sets, allowing them to understand trends in a better way. But employees are unable to reap all the benefits of data analysis and big data due to lack of quick and reliable access to this information.

According to Gartner, around 85% of Fortune 500 companies are unable to leverage big data analytics due to lack of accessibility to data, resulting in missed opportunities to improve the customer experience.

But with cloud storage in place, employees can access company data remotely from wherever they want. It helps employees to serve their customers better, ultimately resulting in improved profit margins.

Apart from increasing accessibility and utility, cloud-powered big data analysis also allows your business to export all of your IT needs – such as hosting and maintaining servers – to the cloud service provider. Instead of investing in servers and other IT infrastructure, you can hire more staff and improve your product. In this way, cloud storage helps create a more competitive playing field for small companies.

TechnologyAdvice has published a comprehensive study – “Data Analytics in Cloud Computing” – which covers this important topic in detail. It’s well worth the time to read in its entirety.

What are the best ways to track performances?

TechnologyAdvice’s study covers four best uses of data analytics, provided verbatim:

Social Media – A popular use for cloud data analytics is compounding and interpreting social media activity. Before cloud drives became practical, it was difficult processing activity across various social media sites, especially if the data was stored on different servers. Cloud drives allow for the simultaneous examination of social media site data so results can be quickly quantified and time and attention allocated accordingly.

Tracking Products Long thought of as one of the kings of efficiency and forethought, it is no surprise Amazon.com uses data analytics on cloud drives to track products across their series warehouses and ship items anywhere as needed, regardless of items proximity to customers. Alongside Amazon’s use of cloud drives and remote analysis, they are also a leader in big data analysis services thanks to their Redshift initiative. Redshift gives smaller organizations many of the same analysis tools and storage capabilities as Amazon and acts as an information warehouse, preventing smaller businesses from having to spend money on extensive hardware.

Tracking Preference – Over the last decade or so, Netflix has received a lot of attention for its DVD deliver service and the collection of movies hosted on their website. One of the highlights of their website is its movie recommendations, which tracks the movies users watch and recommends others they might enjoy, providing a service to clients while supporting the use of their product. All user information is remotely stored on cloud drives so users’ preferences do not change from computer to computer.

Because Netflix retained all their users’ preferences and tastes in movies and television, they were able to create a television show that statistically appealed to a large portion of their audience based on their demonstrated taste. Thus in 2013, Netflix’s House of Cards became the most successful internet-television series ever, all thanks to their data analysis and information stored on clouds.

Keeping Records – Cloud analytics allows for the simultaneous recording and processing of data regardless of proximity to local servers. Companies can track the sales of an item from all their branches or franchises across the United States and adjust their production and shipments as necessary. If a product does not sell well, they do not need to wait for inventory reports from area stores and can instead remotely manage inventories from data automatically uploaded to cloud drives. The data stored to clouds helps make business run more efficiently and gives companies a better understanding of their customers’ behavior.

Cloud computing doesn’t have to be risky

Security concerns were common in cloud computing’s early days. However, ongoing improvements in security technology and protocols have earned user confidence. Today’s measures – combined with exercising proper due diligence – can provide the necessary data security. Here are some matters to consider in evaluating a cloud storage solution.

  • An excellent reputation for physical and network security.
  • Make sure that the cloud storage service offers multiple redundancies, as well as redundancy across several geographic locations to permit disaster recovery.
  • Learn how long it takes to delete a file across the redundant servers, and if it will ever be deleted from the cloud storage banks.

Also, mobile security is a concern, especially for those who don’t take adequate precautions to protect their digital content. With the trend toward bring your own device (BYOD) picking up, it is essential to keep your content safe. Our blog post – “What You Need to Know Before Your Company Adopts BYOD” – covers BYOD security best practices in detail.

Standard encryption cannot protect your data from internal theft, loss of devices or insecure personal devices that are used for business purposes. A cloud-based content security solution applicable for use on multiple types of devices is your best protection in case of theft or loss.

That is where DocuServe’s cloud-based content security solution comes into the picture. It is a document-centric cloud-based content security solution that can be used to secure a wide range of data, including:

  • Sales documents and marketing material
  • Internal training manuals and videos
  • Retail and wholesale pricing sheets
  • On-site and off-site inventory information
  • HR data and other internal documents
  • Executive-level communications

DocuServe provides automatic encryption of your documents and other rich media files. Your files and data stay in the cloud and not on the recipient’s device, making mobile security much safer for your business.

Contact us to learn more about what we can offer.

 

 


A robber holding a computer

How Secure Is Your Digital Content?

Data security is – or should be – a top priority for businesses both big and small. With data breaches increasing, it is imperative to implement security measures at every level. So, what should organizations do to streamline and secure their digital workplace and content? Our DocuServe team offers information about essential tools, trends and advice – especially for web developers who use WordPress.

Collaboration in the cloud – the advent of the CCP

Every business knows that a migration to the cloud is necessary. The productivity gains of going paperless and the sheer speed of a digitally-integrated workflow are only possible with a well-implemented content collaboration platform (CCP) solution.

As defined by Gartner, the CCP market covers a range of products and services that enable content productivity and collaboration. CCPs are aimed at individuals and teams, inside or outside an organization. Additionally, CCPs increasingly support lightweight content management and workflow use cases.

Why does your digital workplace need a CCP?

If you want to improve productivity and teamwork, you need to devise secure ways for content sharing and collaboration with your employees and colleagues both inside and outside your organization. According to Gartner’s content collaboration magic quadrant, 50 percent of midsize and large organizations in mature regional markets are expected to use a CCP by 2022 to improve productivity and collaboration and implement document workflows.

CCPs not only empower and connect people, but also enable a new level of productivity, collaboration and efficiency. Just as importantly, it covers security and compliance issues, in addition to helping meet business goals. As outlined by Gartner, the core functionalities of CCPs include:

  • Mobile access to content repositories.
  • File synchronization across devices and cloud repositories.
  • File sharing with people and applications, inside or outside an organization.
  • Team collaboration with dedicated folders.
  • A content repository, which can be cloud-based or on-premises, native to the CCP platform or based on other file servers or repositories.

Using these workplace apps separately and out of context of a CCP platform is difficult and trying for employees to use to perform specific tasks. Also, managers and employees perceive these workplace apps in a different light. When you opt for a CCP, you can eliminate most of these problems because they offer different levels of support for the following:

  • Data protection and security
  • Usability
  • Mobility
  • Simplicity
  • User productivity
  • File manipulation
  • Content management
  • Collaboration
  • Analytics
  • Workflow
  • Data governance
  • Integration
  • Management
  • Administration
  • Storage

What to avoid

KIssflow’s Employee Experience Survey was conducted to assess the day-to-day interactions of the employees and leaders of various industries with workplace software – and the extent to which the workplace software affects the overall employee experience. Findings revealed the following:

  • The opinion is different among employees and leaders on how much workplace software they use.
  • Employees are less satisfied with the software they use than the leaders.
  • Employees are less likely to believe than their leaders that workplace technology empowers them to do their jobs in a better way.
  • When it comes to using workplace technology to their advantage, employees face several obstacles. Some of these obstacles are inadequate training, confusing and complex interface, and lack of guided learning tools.

According to Kissflow CEO Suresh Sambandam, “We can’t build enterprises as we did a decade or so ago, but the problem is, we’ve started working for the tools we’ve implemented, instead of the tools working for us. Each time a tab is switched, productivity goes down and some momentum is tossed away.

“With a digital workplace, enterprises are providing a radically new experience so that working is easy and fun, and not a burden to fathom all the things that are going on in 6-7 different applications running as siloed tabs on people’s browsers.”

CCPs offer complete data protection and uninterrupted service, and can be extremely useful for start-ups that have small teams and need to work closely with external teams on different projects. With a CCP in place, you can communicate efficiently to complete projects which need collaboration. It keeps your business organized and help you avoid workplace silos.

Keeping your digital content secure

As previously mentioned, information security is a serious threat to organizations worldwide. Your data is a major investment – as is your website. Because 25 percent of websites are powered by WordPress, it should not be surprising that hackers frequently target WordPress sites.

Fly Plugins offers crucial tips for keeping your digital assets safe and secure.

Make sure your foundation is strong – When you talk of security, you need to ensure that your foundation is secure. And, a secure foundation starts with your laptop or desktop computer. Should the hackers compromise your device, you can’t do much by securing WordPress.

Use a strong password – Not to be rude, but you’re probably not as clever as you think you are. Don’t use a password that has a personal meaning you believe no one will ever guess, or assume that no hacker would try anything as obvious as “password 123” or “password.” Don’t keep a text file or spreadsheet of your password. Never use a sticky note on your laptop that has all of your passwords.

In addition:

  • The physical security of your laptop is of utmost importance. Make sure that you keep it in a safe place to prevent theft.
  • Always use an antivirus program – add a firewall for additional security.
  • Always use a secure Wi-Fi connection.
  • If your organization has a bring-your-own-device (BYOD) policy, take the appropriate security measures. Our blog post on the topic covers what you need to know.  

Select a secure web hosting service – Server-level security is also of utmost importance. When you select a web hosting service provider, perform your due diligence so that you know in detail the level of security it provides.

Set up WordPress correctly from the start – Do not use ‘admin’ as the primary administrator account. Ensure that you do not begin your database table names with ‘wp.’ Again, use strong passwords for the admin account, and use multilevel authentication.

Keep yourself updated –Keep current on all security updates, as well as WordPress, themes, and plugins. Have a staging site so you can test the updates before using them on your live site.

Also, ensure that you only install plugins you trust. In most cases, the plugins available on the WordPress site are safe. You need to be careful with free plugins. It is important to go through the reviews before installing them. Never download a free premium plugin.

Secure the goods – You can install the free Sucuri plugin, which performs all the necessary security monitoring and malware detection, and has tools that harden your WordPress site. The Sucuri scan feature can clean your site, and its primary features include security activity auditing, file integrity monitoring, remote malware scanning, blacklist monitoring, effective security hardening, post-hack security actions, security notifications and website firewalls.

No matter what platform your company uses to meet its unique needs, DocuServe specializes in offering industry-leading solutions for keeping your digital content safe. Our secure document and rich media sharing app can reduce the risk of data exposure. With DocuServe, you can easily control content distributed to employees, vendors, and potential customers. Contact us to learn more.

 


Enterprise Security

What is Enterprise Security?

With the threat of cyberattacks looming large in organizations of every size, it is imperative for companies to have foolproof security in place to keep their data safe and secure. But enterprise security is a challenging and broad issue. To reduce and eliminate the risk of unauthorized access to information technology systems and data, you need to have a comprehensive strategy that secures all entry and end points.

Enterprise security comprises the strategies and techniques that companies undertake to reduce the risk of unauthorized access to data, IT systems, and information. The activities in enterprise security include the institutionalization, advancements, change and evaluation of a firm’s enterprise risk management (ERM) and security methods.

Enterprise security administration entails different business units, staff, personnel and officials to work together to secure a company’s digital assets, ensure data loss prevention and safeguard the company’s reputation. Enterprise security activities should be in line with the organization’s compliance requirements, culture and administration strategies. Enterprise security activities include conducting vulnerability and risk analysis tests that are intrinsic to the organization’s business.

Enterprise security is also about devising procedures and strategies that can safeguard the company’s physical assets.

Dealing with the human factor

Though all technological help should be put in place to keep cyber attacks at bay, it is also vital for organizations to understand the human angle in dealing with the security issue.

Humans have broken many barriers when it comes to technology. However, people have a habit of experimenting with technology that at times goes beyond the original intent. Experimentation with technology is good, but this is also the point where security problems begin. As organizations embrace technology, it is becoming increasingly difficult for companies to predict all the threats and vulnerabilities that come to fore in the process. This is what makes enterprise security reactive by nature, and that is why protecting the system or asset becomes extremely difficult.

Also, security has become a problematic issue because of economic reasons. The market these days has become extremely saturated and fragmented. Enterprise security companies claim to offer almost identical solutions to everyone in the market. In addition, buyers are more interested in getting a solution that helps them meet their compliance norms rather than address their security problems. Also, buyers are ready to purchase solutions that are not effective, and sellers continue to market their product as if their product is infallible. Both buyers and sellers are operating in an environment of uncertainty, which adds to the enterprise security problem.

Two of the other issues that further complicates enterprise security are the cloud and the internet of things (IoT) because they expand the total attack surface.

How can companies approach security at a strategic level?

The fact is that there are countless moving parts in enterprise security. Since the challenge of enterprise security is so dynamic, pledging technological, organizational and financial resources to one specific strategy can prove counterproductive. Despite the fluid condition that governs the market forces and recent developments in IT/OT infrastructure, one factor that remains constant throughout is that all the cyber attacks are carried out by human beings.

Irrespective of the motives and methodologies of the attackers, be it rogue actors, industry competitors, corporate insiders, organized crime syndicates or nation-states, they can only operate within limits dictated by human behavior.

To effectively address potential insider threats, organizations should have full visibility into every employee, customer, and contractor. And, to address external threats, organizations should proactively try to identify attackers and their recognized patterns of behavior.

The future of enterprise security

Mobile security has always been an issue with enterprise security and will remain so in 2019 as well. The future of enterprise security vis-à-vis mobile presents a characteristically scary scenario. Mobile threats are on the rise and businesses need to be mindful of this development. Here is a complete lowdown of mobile security threats – present and future.

According to David Slight, president of Quora Consulting in North America, security, security, and security will dominate enterprise mobility in 2019.

Some of the main security problems that mobilized enterprise will face in 2019 are:

WPA-3 – WPA-2 which has been in use for over a decade has encountered vulnerabilities in the last two years; hence WPA-3 was introduced last year. The standard rollout of WPA-3 will take place this year which means a lot of work needs to be done that includes an upgrade to the 192-bit encryption in WPA-2. An enterprise will have to update its RADIUS service to use this enhancement. For public networks, WPA-3 will use a new encryption format called OWE which prevents snooping and session hijacking. But Wi-Fi access points need to be upgraded to support the WPA-3 which is what will make a mobile device secure.

Home office security is a big problem – In 2019, the home will become a more popular attack vector. The problem on this front is escalating because of the rise in the popularity of smart devices and home offices. As these devices are used for both private as well as business purposes, it makes the devices insecure which will be a big challenge to tackle in 2019.

The 5G network rollout will be a challenge – 2019 will see the rollout of 5G. And, like with every new technology, security will remain the main concern. Though the 5G mobile devices will not be widely available in 2019, securing these devices is going to be challenging and expensive. As more 5G IoT devices will connect to the 5G network directly without a Wi-Fi router, it will make devices more vulnerable to direct attack.

The IoT also poses threats – There are billions of endpoints in the IoT. Onboard security is often compromised to keep down the cost of each endpoint and to power them. What worsens the problem is that the IoT devices are available to hackers readily. Since IoT offers several loopholes because the systems are primeval and vulnerable to attacks, it is advisable to hire outside penetration companies to identify the weak spot to avoid breaches.

Attackers think globally, but act locally – Too many employees have a careless attitude towards workplace security, which makes the job of an attacker easy. The threat is likely to come from the network (compromising a single Wi-Fi connection) or phishing.

Does bring your own device (BYOD) affect enterprise data security?

Though security professionals are increasingly becoming open to embracing BYOD policies, yet businesses are not too confident when it comes to the data security of employees’, laptops, tablets, and personal phones. A recent Bitglass study reveals that out of the 400 IT experts surveyed, 30% were hesitant to embrace BYOD because of security concerns like data leakage, shadow IT, and unauthorized access to data. With GDPR or General Data Protection Regulation and other data privacy mandates kicking in, it has become vital for the organizations to monitor and protect their data.

There is a growing acceptance of personal devices in the enterprise – Using personal devices for work was not the norm just a few years back. Though employees used their personal computers and laptops to access company networks, as a concept BYOD was not prevalent in organizations back then.

Mobile threats are on the rise, yet security has not changed much – Since the mobile devices are relatively insecure, it is not surprising that criminals target is so often and with precision. It is not difficult for criminals to gain access to both corporate data as well as personal data from an easy-to-breach mobile device. Mobile device management tools and remote wiping, basic security precautions, are put in place only by 50% of those surveyed in the Bitglass study. Also, many security teams don’t have clear visibility about the apps used on personal devices.

Though the federal government’s use of mobile technology is improving, many communication paths remain insecure which makes the whole ecosystem vulnerable to attacks (a U.S. Department of Homeland Security (DHS) study).

Similar security loopholes are present in the private sector as well. Mobile devices are considered the riskiest point of intrusion to corporate networks.

Put in place smart policies for BYOD security – You need to ensure that your employees use personal devices safely and securely. BYOD is a beneficial yet risky practice. Before a company adopts BYOD, it should put in place a smart BYOD policy so that their data remains safe and secure. When it comes to BYOD, here is what you need to do to keep your enterprise data safe and secure:

Find out whether your employees need to use personal devices for doing their work. Those who don’t need regular access to networks or employees who work remotely should be left out of the BYOD program because it is difficult to monitor their devices.

Next, encourage your employees to update their operating systems and security software regularly. Make it mandatory for employees to use corporate security software on personal devices. And, if they are connecting their devices to the enterprise network, they should follow the company’s security protocols.

As you can see, enterprise security is a complex goal to achieve. DocuServe has the industry experience and solutions to protect company data to ensure that all your data remains safe and secure. From securing your data in the cloud and protecting your corporate secrets to keeping your mobile devices safe, DocuServe is a one-stop shop. Contact us to learn more about our industry-leading solutions.


Cybersecurity Degree Programs, Cybersecurity Masters Degree, Degree in Cyber Security, Online Security, Internet Security

Interested in Internet Security? Get a Cybersecurity Masters Degree!

Cybersecurity Degree Programs, Cybersecurity Masters Degree, Degree in Cyber Security, Online Security, Internet Security

No one can forget the infamous Sony Pictures security breach of 2014, where confidential information was released courtesy of computer hackers who called themselves the “Guardians of Peace.”

Cybersecurity attacks are becoming more frequent, and the demand for jobs is reaching a fever pitch. A new report out from Cybersecurity Ventures estimates there will be 3.5 million unfilled cybersecurity jobs by 2021, up from 1 million openings last year.

Employment figures from the U.S. and India highlight the cybersecurity labor crisis.

In 2017, the U.S. employed nearly 780,000 people in cybersecurity positions, with approximately 350,000 current cybersecurity openings, according to CyberSeek, a project supported by the National Initiative for Cybersecurity Education (NICE), a program of the National Institute of Standards and Technology (NIST) in the U.S. Department of Commerce.

Most IT security jobs require at least a bachelor’s degree in a computer related field however many colleges are expanding to have cybersecurity master’s degree programs, and here are some of them…

 

American Military University Logo_Cybersecurity Masters Degree Programs

American Military University (Charles Town, W.Va.) – The Master of Science in Cybersecurity Studies program takes a broad, multidisciplinary approach to preventing and responding to large-scale cyber threats and cyber attacks. The first half of the online, two-year program provides a foundation in network security, information assurance, cyber crime and digital forensics. The second half focuses on the issues, policies, practices and perspectives of various sectors, critical infrastructures, agencies and disciplines, such as national security, intelligence, criminal justice and emergency management.

 

Carnegie Mellon University_Cybersecurity Masters Degree Programs

Carnegie Mellon University (Pittsburgh)—In 16 or 20 months, the Master of Science in Information Security enhances a technical education in computer systems and security with research/development opportunities and the option to take additional courses in areas complementary to security. Graduates may pursue doctoral degrees or positions as security experts equipped to manage the growing complexities associated with securing data, networks and systems. This graduate degree program meets the criteria for the NSF-funded CyberCorps Scholarship for Service Program (SFS). U.S. citizens who are accepted may be eligible for a full scholarship and stipend from the federal government.

 

Fordham University_Cybersecurity Masters Degree Program

Fordham University’s School of Professional and Continuing Studies (Bronx, N.Y.)—Fordham’s Master of Science in Cybersecurity program is a combination of weekend, online and hybrid courses is designed for completion in 12 months over three semesters. Students learn how to identify solutions to global cyber threats while mastering legal, ethical and policy issues using methods in computing and informational science, engineering and social science. Program highlights include small classes taught by academia and industry experts, intensive lab experience in a dedicated cybersecurity research lab, and networking opportunities and career support.

 

George Washington University_Cybersecurity Masters Degree Programs

George Washington University (Washington, D.C.)—The Master of Science in Cybersecurity in Computer Science program was created to respond to the large and fast-growing need for technical cybersecurity experts nationally and internationally. Students acquire up-to-date knowledge and skills in cybersecurity and get a firm grounding in requisite core knowledge in computer science, as well as the ability to take courses in related disciplines. GWU also offers the Master of Engineering in Cybersecurity Policy and Compliance (online).

 

Indiana University_Cybersecurity Masters Degree Programs

Indiana University (Bloomington, Ind.)—The Master of Science in Secure Computing offers an interdisciplinary focus that combines coursework in mathematics, protocol analysis, and system and network security, with business and economics, social engineering, human-computer interaction, and other disciplines. The Master of Science in Cybersecurity Risk Management program will bring together cybersecurity courses from law, business and computer science. The degree offers integrated coursework from the School of Informatics and Computing, the IU Maurer School of Law, and the IU Kelley School of Business.

 

Northeastern University_Cybersecurity Masters Degree Programs

Northeastern University (Boston)—The Master of Science in Information Assurance and Cybersecurity program enables students to gain the broad knowledge needed to make strategic decisions to combat information security threats, including identity theft, computer malware, electronic fraud and cyber attacks. The program explores key issues in information security and how technology can help resolve them. It combines an understanding of IT with relevant knowledge from law, the social sciences, criminology and management.

 

University of Southern California_Cybersecurity Masters Degree Programs

The University of Southern California (Los Angeles)—USC Viterbi’s Master of Science in Cyber Security Engineering program focuses on the fundamentals of developing, engineering and operating secure information systems. Curriculum fosters understanding in developing a security policy and how policy drives technology decisions. Students solve challenges and problems of secure operating systems, secure applications, secure networking, use of cryptography and key management. This program is also available online to professional engineers through the Distance Education Network.

 

University of South Florida_Cybersecurity Masters Degree Programs

The University of South Florida (Tampa, Fla.)—The Master of Science in Cybersecurity interdisciplinary program has four concentrations. The Cyber Intelligence concentration prepares graduates for entry-level or advanced positions as cyber intelligence or threat intelligence analysts. The Digital Forensics concentration helps students gain the skills needed to investigate computer, cyber and electronic crimes; analyze networks that have been attacked or used for illicit purposes; and properly identify, collect, secure and present digital evidence. The Information Assurance concentration provides a core foundation of knowledge and applied expertise in information security controls, the regulatory environment, and information risk management and incident response. The Computer Security Fundamentals concentration provides a core foundation of technical knowledge necessary to design and build secure computing systems, detect unauthorized use, and protect systems, resources and data that they store or access. All courses are fully online.

 

University of Washington_Cybersecurity Masters Degree Programs

The University of Washington (Bothell, Wash.)—The Master of Science in Cyber Security Engineering prepares students to protect cyber systems with the necessary technical and leadership skills. Students gain expertise and confidence in making difficult security trade-offs and carrying out essential changes to keep and maintain secure systems. They gain hands-on experience in a myriad of research areas, such as penetration testing, emerging technologies, vulnerability analysis, network security, human-computer interaction, wireless security and cryptography. The degree is designed to meet the needs of working professionals. Enrollment is either part-time or full-time, with courses meeting in the evening two or three times a week. Most students complete the program in just over two years.

 


Digital Content Security, Mobile Security, Encryption Algorithms, Encryption Apps, Secure Mobile Applications

Security Applications & Tips to Keep Your Mobile Device Secure

Mobile security threats are on the rise, and criminals are using top level domains (TLDs) for phishing sites. It started with a trend towards the generic use of (i.e., non-geographic) TLDs such as .support and .cloud to create URLs that appear to be authentic. For example: review-helpteam.support, contact-us.site, summary-account.review

Now, instead of using these gTLDs so simulate authenticity, threat actors have identified a new way to create believable URLs, and it’s focused exclusively on the mobile market. Instead of trying to create legitimate looking URLs, threat actors have started including real, legitimate domains within a larger URL, and padding it with hyphens to obscure the real destination.

While the best defense is to become familiar with these threats and the cyber criminals tactics, there are a few apps such as Mobile Security & Antivirus, Avast Mobile Security, and Trend Micro that help detect malware for mobile users.
-Intro by Lindsey Havens, Senior Marketing Manager at PhishLabs

Digital Content Security Apps

We spoke with Tonia Baldwin of A1 Connect and got two of her favorite apps for online security. The first is Dashlane, a secure password keeper, followed by Folder Lock, an app that locks specific folders and files.

Password Manager App: Dashlane

Dashlane Logo_Mobile Device Security

A strong password is often the difference between your documents staying safe and a catastrophic data breach. Password vault apps like Dashlane are essential if you have lots of accounts on various sites and apps and want to use a different strong password for each one. It also calculates your overall security score and gives you suggestions on how to improve it. Dashlane even generates unique strong passwords for you, so you don’t even need to think of them yourself. 

Using the same password for every site is a way to beckon disaster should one account be hacked into. With password managers, the only password you need to remember is the one to get into the app, so make sure it’s a strong one.

Password Manager App: Folder Lock

Folder Lock Logo_Mobile Device Security

If someone manages to steal your mobile, then there’s not much stopping them from hooking the phone up to their laptop and accessing all of the files they want to. Folder Lock is basically an encryption app that will let you password protect specific folders and files. It’s the melding of physical and virtual security that makes this app a winner.

It also offers other features like cloud-based backup storage and the ability to lock down your apps to keep any personal information in them secure.

7 Tips To Stay Secure on Mobile Devices

Now that you have mobile apps for logging in and keeping your files secure, we wanted to provide tips on how to keep your business and personal networks secure. For that we got in touch with Robert Siciliano, Cyber Security expert with Hotspot Shield, and came up with 7 tips that will keep you and your boss happy!

1- Don’t Buy Apps from Third-Party Sources

Apps are quite popular, and there are many that can help to boost productivity in a business setting. However, Apple devices that are “jailbroken” or Android devices that are “rooted” are outside of the walled garden of their respective stores and susceptible to malicious viruses. Make sure your employees know that they should never buy an app from a third-party source. Only use the official Apple App Store or the Google Play Store.

2- Always Protect Devices

It’s also important that you advise your employees to keep their devices protected with a password. These devices are easy to steal since they are so small. If there is no password, there is nothing stopping a bad guy from getting into them and accessing all of the accounts that are currently logged into the device.

3- Install a Wipe Function on Company Mobile Devices

You should also require all employees to have a “wipe” function on their phones. Even if they are only doing something simple, like checking their work email on their personal mobile device, it could get into the wrong hands. With the “wipe” function, the entire phone can be cleared remotely. You should also require employees to use the setting that erases the phone after a set number of password attempts.

4- Require Company Mobile Devices to Use Anti-Virus Software

It’s also important, especially in the case of Android devices, that all mobile devices on the network have some type of anti-virus software.

5- Do No Jailbroken Devices on Your Company Network

Jailbroken devices are much more vulnerable to viruses and other malware.  So, never allow an employee with a jailbroken phone to connect to your network.

6- All Employees Should Activate Update Alerts

One of the easiest ways to keep mobile devices safe is to keep them updated. So, make sure that all employees have update alerts enabled, and make sure that they are updating their devices when prompted or automatically.

7- Teach Employees About the Dangers of Public Wi-Fi

Finally, make sure your staff knows the dangers of using public Wi-Fi. Public Wi-Fi connections are not secure, so when connected, your devices are pretty open. That means, if you are doing things that are sensitive, such as logging into a company website or accessing franchise accounting records, a hacker can easily follow. Instead, urge employees to use a VPN


Twitter: @Docuserve

Facebook: @Docuserve