Categories
Casserly Consulting Blog

Using a QR Code to Log In

qr_code_log_in_scan_400.jpg

Passwords are still an incredibly valuable part of security, but it’s becoming quite difficult to maximize network security through passwords alone. Even if you somehow manage to sell the idea of network security to your staff, whether or not they follow through is another thing entirely. It’s critical that you make it as easy as possible for your employees to stay secure, and that’s where scannable QR codes come in.

Why QR Codes?
By using a QR code to connect to your business’ wireless network, you can improve security. There are several benefits to this approach compared to the traditional alphanumeric password. An alphanumeric password can’t be shared as easily as a QR code, and the last thing you want to do is share your specific Internet access credentials. The real kicker is that a QR code makes things much easier on the side of the end-user. Instead of using a touchscreen to plug in a PIN or password, you can simply use the right app on your mobile device to take a picture of a QR code. It’s a great way for businesses to allow guests access to a wireless network without carelessly handing out credentials.

How to Use a QR Code
If you want to use a QR code to access the Internet, you will need to have a system in place that generates a code. You can use any of various websites or applications that create QR codes for whatever network that you want to connect to, as well as its password. You’ll also want to review any terms of service or other policies before making sure that you want to share this information for any reason.

Once you’ve done this, you’ll be able to download the end result. You now have an easy way to access your Internet without creating a security risk for yourself. Do you have any other security concerns that need addressing? COMPANYNAME wants to help. To learn more, reach out to us at PHONENUMBER.

Categories
Casserly Consulting Blog

Why Your IT Toolkit Should Include a VPN

Your_IT_Toolkit_Should_Include_a_VPN_400.jpg

Have you ever felt like someone was watching you while you’re doing your work from somewhere outside of your business’ infrastructure? If you’re working from a remote location, this situation might not be far from the truth. If you’re not using a private connection, onlookers could see everything that you’re doing or steal data. How can you keep your business secure while working out of the office?

The easiest way to do so is with a virtual private network, or VPN. You might have already heard quite a bit about VPNs thanks to the Federal Communications Commission’s verdict on Net Neutrality. Many users are hoping to take advantage of VPNs to limit the potential issues caused by ISPs selling browsing information to advertising companies, and just in general to protest the ruling. However, VPNs have a very important role in the business world as well, and they are an essential part of securing your organization.

Basically, a VPN works by encrypting your connection to important assets on your company’s network. This data is encrypted while it’s in transit, meaning that even if a hacker could intercept it, they would see nothing but a bunch of jumbled up letters, numbers, and symbols. Encrypted data is often simply useless for hackers as the time needed to crack the code is rarely worth spending. This goes for any data that’s being sent to or sent by your device, meaning that essentially any data that you need to send or receive is protected by military-grade encryption.

Think of it like this; you’re sending a letter to someone, but it’s locked in a box. The box can only be opened by specific users that have the key to it. Therefore, anyone hoping to intercept the box won’t be able to take the contents. Sure, they could steal the box if they want, but without the key, it won’t be of any use.

Overall, a VPN is the best way to keep your business from suffering data leaks or loss altogether. However, you want to ensure that the one you implement is an enterprise-level VPN that is capable of securing all of your business’s devices. If your business is in need of a powerful VPN, COMPANYNAME can help. To learn more, reach out to us at PHONENUMBER.

Categories
Casserly Consulting Blog

The IoT Can Be Very Useful, but Also Risky

internet_of_thing_blue_400.jpg

You might be surprised to hear how the scope of the Internet of Things has increased over the past few years. These connected devices are all over the place. In order to ensure that your business isn’t affected in a negative way by these IoT devices, you’ll need to consider the many risks and how you will respond to them.

What is an IoT Device?
Essentially, any device that connects directly to the Internet or sends data to and from the Internet through another device is considered an IoT device. A smartwatch that connects to Wi-Fi, or a fitness tracker that shares data fall into this realm. From smart appliances, like Amazon’s Alexa and Google Home, to Internet-connected coffee machines are all Internet of Things devices. While the data they share might not always be extremely sensitive, they could open up other ways for your sensitive data to be reached.

Ask yourself – does this device connect to the Internet or network in some way? If so, it doesn’t mean it is a risk, but it does need attention.

What are You Risking?
When you’re putting together your business’ policies regarding the IoT, you should consider what assets you’re willing to leave vulnerable. It essentially boils down to what you’re willing to let your employees access. If your employees have access to a lot of data, you’re increasing the risk involved with IoT devices in the office. In much the same way, you can control how much data is at risk by limiting which employees can access it. It’s a great way to ensure that the Internet of Things poses a minimal threat to your business and its data.

On the other hand, it’s important to remember that IoT devices will still pose a threat in some way, simply due to the amount of them. There will always be too many factors to take into account to guarantee safety from any and all devices. Therefore, you should consider as many as feasibly possible. The data’s sensitivity is chief among these considerations, as well as the employee’s particular role within your organization. If they are mostly separated from confidential or sensitive data, then perhaps they can use basic IoT capabilities with little consequence. Granted, this assumption varies between industries, so be sure to make it clear what you expect from your staff in your employee handbook.

Train and Prepare Your Staff
Security isn’t something that can only come from one employee–rather, it “takes a village,” so to speak, and everyone must be mindful of security practices. This is incredibly important for the Internet of Things, but everyone needs to be on board–not just management or leadership. All employees need to be aware of the cybersecurity policies used by your company, as well as the various risks associated with the Internet of Things. Plus, it never hurts to be aware of even the most benign warning signs of common security threats.

Lead by Example
If you want your employees to prioritize security for your workplace, start by taking the first steps yourself. After all, you can’t expect your employees to do something that you yourself don’t do. Management should be able to set an example for their workforce, and this is how the IoT is prepared for most effectively.

Is your business utilizing any IoT devices? COMPANYNAME can help your business prepare for this connected technology revolution. To learn more, reach out to us at PHONENUMBER.