<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>data security &#8211; tekRESCUE</title>
	<atom:link href="/tag/data-security/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>SEO &#38; Managed IT Solutions for Austin, San Marcos &#38; Central Texas</description>
	<lastBuildDate>Tue, 07 Jun 2022 18:53:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.0.1</generator>

<image>
	<url>/wp-content/uploads/2020/09/tekrescue-site-icon_512-84x84.png</url>
	<title>data security  - tekRESCUE</title>
	<link>/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What You Should Know About Secure File Sharing</title>
		<link>/what-you-should-know-about-secure-file-sharing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=what-you-should-know-about-secure-file-sharing</link>
		
		<dc:creator><![CDATA[Stephen Mesko]]></dc:creator>
		<pubDate>Fri, 03 Dec 2021 21:15:28 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[data security]]></category>
		<guid isPermaLink="false">/?p=18025</guid>

					<description><![CDATA[<a href="/what-you-should-know-about-secure-file-sharing/" title="What You Should Know About Secure File Sharing" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2021/12/cloud-computing-and-file-sharing_900x600.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Person using a cloud computing service to share files" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2021/12/cloud-computing-and-file-sharing_900x600.jpg 900w, /wp-content/uploads/2021/12/cloud-computing-and-file-sharing_900x600-600x400.jpg 600w, /wp-content/uploads/2021/12/cloud-computing-and-file-sharing_900x600-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>The internet is a beautiful thing. You can find just about anything you want and communicate with people all over the world. It has also made it possible for anyone to share information, no matter how sensitive or valuable, without the worry of being tracked down. But this newfound freedom comes at a cost: your...]]></description>
										<content:encoded><![CDATA[<a href="/what-you-should-know-about-secure-file-sharing/" title="What You Should Know About Secure File Sharing" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2021/12/cloud-computing-and-file-sharing_900x600.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Person using a cloud computing service to share files" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2021/12/cloud-computing-and-file-sharing_900x600.jpg 900w, /wp-content/uploads/2021/12/cloud-computing-and-file-sharing_900x600-600x400.jpg 600w, /wp-content/uploads/2021/12/cloud-computing-and-file-sharing_900x600-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>
<p class="has-drop-cap">The internet is a beautiful thing. You can find just about anything you want and communicate with people all over the world. It has also made it possible for anyone to share information, no matter how sensitive or valuable, without the worry of being tracked down. But this newfound freedom comes at a cost: your privacy and security are in jeopardy if you don&#8217;t know what you&#8217;re doing. In this blog post, let&#8217;s talk about secure file sharing, why it&#8217;s important to keep your files private, and how to do so while still taking advantage of everything the internet offers.</p>



<h2>Why it&#8217;s important to Secure Your File Sharing</h2>



<p>You may not think it, but you&#8217;re essentially putting your entire digital life on display when you share files online. From your bank statements to your vacation photos, there&#8217;s no end to the sensitive information that can be gleaned from unprotected file sharing. And if that wasn&#8217;t bad enough, cybercriminals are always looking for new ways to exploit unsuspecting users. By encrypting your files before sharing them, you can rest assured that your privacy is protected and that your information is safe from prying eyes.</p>



<h2>How to Secure Your File Sharing</h2>



<p>Fortunately, securing your file sharing is a relatively easy task. All you need is a good VPN service and a few minutes of your time. Here are the steps you need to take:</p>



<h3>Never use public WIFI</h3>



<p>Don&#8217;t access any sensitive sites (e.g., online banking) through public WiFi networks if you&#8217;re out and about. These are easily compromised by hackers looking for passwords and other personal data they can use to gain access to your accounts.</p>



<h3>Use strong passwords</h3>



<p>It&#8217;s also important that you create unique usernames/passwords for every site that requires one. Not doing so makes it easy for cybercriminals to break into your accounts- even if you think they&#8217;re secure.</p>



<h3>Use full disk encryption</h3>



<p>When available, enable encryption on all of your storage devices (e.g., hard drive). This is especially relevant with laptops which contain loads of information about everything from your Amazon shopping habits to the embarrassing photos you&#8217;ve shared with friends.</p>



<h3>Use a VPN</h3>



<p>A VPN is your best bet for ensuring that your file sharing is secure. Not only does it encrypt your data, but it also protects your IP address from being tracked down by third-party snoopers.</p>



<h3>Enable verification on your accounts</h3>



<p>Many social networking and file-sharing sites will allow you to use verification tools that help protect your account from hackers. These include services like two-factor authentication and login approvals. They may be a pain to set up, but they&#8217;re well worth the trouble if it means keeping cybercriminals at bay.</p>



<h3>Keep all of your software up to date</h3>



<p>Cybercriminals always try to take advantage of security gaps in popular programs (e.g., Adobe Flash). So make sure that you keep everything as up-to-date as possible so that their attacks are less likely to succeed.</p>



<h2>Key Takeaway</h2>



<p>As you can see, there are a number of things you can do to keep your file-sharing private and secure. By following the tips we&#8217;ve outlined in this blog post, you&#8217;ll be well on your way to keeping your data safe from prying eyes.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Offboarding Employees: Often Neglected But Extremely Important</title>
		<link>/offboarding-employees-often-neglected-but-extremely-important/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=offboarding-employees-often-neglected-but-extremely-important</link>
		
		<dc:creator><![CDATA[Randy Bryan]]></dc:creator>
		<pubDate>Mon, 04 Oct 2021 20:18:44 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[data security]]></category>
		<guid isPermaLink="false">/?p=17517</guid>

					<description><![CDATA[<a href="/offboarding-employees-often-neglected-but-extremely-important/" title="Offboarding Employees: Often Neglected But Extremely Important" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2021/10/exit-sign_900x600.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Exit sign on an orange wall" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2021/10/exit-sign_900x600.jpg 900w, /wp-content/uploads/2021/10/exit-sign_900x600-600x400.jpg 600w, /wp-content/uploads/2021/10/exit-sign_900x600-300x200.jpg 300w, /wp-content/uploads/2021/10/exit-sign_900x600-20x13.jpg 20w" sizes="(max-width: 900px) 100vw, 900px" /></a>If your business operates in 2021, more than likely at least some aspects of your day-to-day operations happens in cyberspace. This makes business easier to function, especially over long distances and within separate bases of operation. But it also poses challenges, particularly when multiple employees have access to sensitive data. One of these challenges, surprisingly,...]]></description>
										<content:encoded><![CDATA[<a href="/offboarding-employees-often-neglected-but-extremely-important/" title="Offboarding Employees: Often Neglected But Extremely Important" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2021/10/exit-sign_900x600.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Exit sign on an orange wall" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2021/10/exit-sign_900x600.jpg 900w, /wp-content/uploads/2021/10/exit-sign_900x600-600x400.jpg 600w, /wp-content/uploads/2021/10/exit-sign_900x600-300x200.jpg 300w, /wp-content/uploads/2021/10/exit-sign_900x600-20x13.jpg 20w" sizes="(max-width: 900px) 100vw, 900px" /></a>
<p class="has-drop-cap">If your business operates in 2021, more than likely at least some aspects of your day-to-day operations happens in cyberspace. This makes business easier to function, especially over long distances and within separate bases of operation. But it also poses challenges, particularly when multiple employees have access to sensitive data.</p>



<p>One of these challenges, surprisingly, is sometimes treated as an afterthought—What happens when an employee who has access to sensitive information leaves the company? When an employee leaves a company, whether voluntarily or involuntarily, a process occurs (or needs to occur) to remove that employee&#8217;s access to sensitive information, as well as remove that employee&#8217;s &#8220;digital profile.&#8221; In business terms, this process is called &#8220;offboarding employees,&#8221; and in a digital age, there are right ways and very wrong ways to do it.</p>



<h3>Why is Proper Offboarding Important?</h3>



<p>Here&#8217;s why this is so important:</p>



<ul><li>Studies show that more than 60% of cyber attacks happen from within the company. In other words, employees who had access to sensitive information used that access to in some way sabotage the employer.</li><li>Studies also show that when employees leave a company, even on good terms, chances are the employee left a device, app, or licensed software open. Since the employee never signed off, this open-ended function leaves the door open for hackers to make their way into the company&#8217;s private and sensitive databases.</li></ul>



<h3>What Are Some of The Best Practices For Offboarding Employees?</h3>



<p>Many business professionals, particularly those who work in IT and/or loss prevention, would tell you that the best way to mitigate potential data breaches is to keep all of the company&#8217;s data in a centralized cloud-based location.</p>



<p>In addition to cloud storage, companies should also automate processes that remove employee access to sensitive data, as well as digital profiles (email accounts, etc). This is perhaps one of the more effective ways to offboard employees.</p>



<h3>What If The Database Is Not Centralized in the Cloud?</h3>



<p>In these cases, specific steps need to be taken:</p>



<ol><li>Once a decision is made that an employee will be ending employment, IT should be notified and the process of removing access should begin immediately.</li><li>As an employee moves closer to the departure date, access to any information that is non-essential to the employee&#8217;s remaining tasks should be removed (passwords are changed, keycards are disabled, licensed software permissions removed).</li><li>Employee activity should be monitored closely. This is mainly to see if data transfers are taking place where information is being moved to private accounts. This type of transfer can be an early indicator that the employee may be planning something nefarious against the employer.</li><li>Any mobile devices in the employee&#8217;s possession must be returned. This is an especially difficult challenge. If the employee is in possession of devices that can be removed from the company premises, it&#8217;s more difficult to track what the employee is doing with these devices. Information can sometimes be transferred without the company&#8217;s knowledge. The same is true for personal devices that were never approved by the IT department.</li><li>Make sure that, by the time the employee walks out the door for the last time, all of the access and digital profiles have been revoked and removed.</li></ol>



<h3>Key Takeaways</h3>



<p>Ideally, cloud-based storage platforms make offboarding employees the least complicated because information can be controlled (and in cases removed from personal devices), with the least difficulty. However, if your company is not operating in a central location, the main takeaway is that the offboarding process needs to be thorough, ongoing, and needs to take place immediately.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
