Cyber-security: Apps to keep your information safe

Maintaining physical security - alarms and locks - is critical for safety. So is cyber-security. Failure to establish strong computer security practices could be devastating to your business.

0
3089
Image via Pixabay, CC 0.0.

WASHINGTON, December 10, 2016 – It seems that everyone from the Chinese to the Russians to your competitor down the street is now involved in some form of cybercrime or economic espionage.

Gaining a competitive advantage via computer access has become common practice, costing US businesses more than $445 billion a year, according to the FBI. And that number is galloping madly as companies switch to electronic file storage and electronic communication from paper documents.

What would your competitors find if they accessed your computer? If they obtained your password and started reading your email?

Maintaining physical security – alarms and locks – is critical for safety, and so is cyber-security. Failure to establish strong computer security practices could have devastating implications for your business.



Saudi market flirts with foreign investment


Luckily, there are some relatively simple and inexpensive (read: free) ways to keep your electronic communications secure.

Before you do anything else, check your browser. As cyber-guru and founder of PI Mall, Joe Seanor, explains, Google Chrome is the most secure browser. “Unlike other browsers, Chrome does ‘micro updates,’ which means it is constantly updating. Other browsers only update once a month. So if a bug or security vulnerability emerges, it is fixed on Chrome ASAP. With other browsers,  you have to wait for that once a month update to fix it.”

Another critical step to secure your information is to encrypt emails that contain anything sensitive or proprietary.

Programs like Hushmail, provide encrypted email service for personal and business use. Hushmail is a fairly straightforward program that encrypts communication and involves an interface much like other email programs. The advantage, obviously, is that email is secure. The disadvantage is that you have to log in to a separate email account to send and receive mail.

Virtru, on the other hand, allows seamless email encryption for Outlook and Gmail users. It uses outstanding encryption technology, and has a suite of services like controlling whether an email can be forwarded and allowing the sender to revoke an email even after it has been read. Even recipients who do not have Virtru can download a viewer and read email, and it provides simple prompts that make downloads, installation, and use easy.

Texting is second nature now, and many people text sensitive information without a second thought. Need to keep these conversations secure? There’s an app for that.


Politicized CENTCOM intelligence: Threat to US interests


For secure online chatting a-la Google chat, use Wickr. The program is simple to install and use, and allows users to share photos and videos securely. Wickr has a mobile app that you can use on smart phones and tablets, to keep those communications secure as well. To chat, however, the recipient must also have a Wickr account.

Another option for secure texts is Signal Private Messenger. If you are using Chrome, you can dowload it from the Chrome Store and send secure chatting on your computer. You can also add it to your smartphone, where you can not only text securely, but also have encrypted voice conversations. The only caveat is that like Wickr, the recipient also needs a Signal account.

Making Virtru and Signal standard operating procedure takes only a few minutes and a slight change of thought process, but it could save your company millions.

As hackers increase their capabilities, US companies will find themselves more and more vulnerable.

Don’t be the low hanging fruit. Employ smart cyber-security and keep your information safe.

Click here for reuse options!
Copyright 2016 Communities Digital News

• The views expressed in this article are those of the author and do not necessarily represent the views of the editors or management of Communities Digital News.

This article is the copyrighted property of the writer and Communities Digital News, LLC. Written permission must be obtained before reprint in online or print media. REPRINTING CONTENT WITHOUT PERMISSION AND/OR PAYMENT IS THEFT AND PUNISHABLE BY LAW.

Correspondingly, Communities Digital News, LLC uses its best efforts to operate in accordance with the Fair Use Doctrine under US Copyright Law and always tries to provide proper attribution. If you have reason to believe that any written material or image has been innocently infringed, please bring it to the immediate attention of CDN via the e-mail address or phone number listed on the Contact page so that it can be resolved expeditiously.

SHARE
Previous articleHate your current job? Get cracking with ‘Resume Jiu-Jitsu’!
Next articleChristmas gifts for that hard-to-please Conservative on your list
Lisa M. Ruth
Lisa M. Ruth is Editor-in-Chief of CDN. In addition to her editing and leadership duties, she also writes on international events, intelligence, and other topics. She has worked with CDN as a journalist since 2009. Lisa is also President of CTC International Group, Inc., a research and analysis firm in South Florida, providing actionable intelligence to decisionmakers. She started her career at the CIA, where she won several distinguished awards for her service. She holds an MA in international relations from the University of Virginia, and a BA in international relations from George Mason University. She also serves as Chairman of the Board of Horses Healing Hearts, and is involved with several other charitable organizations, including Habitat for Humanity, The Boys and Girls Clubs of America, and AYSO.