Up and Coming Weekly is a weekly publication in Fayetteville, NC and Fort Bragg, NC area offering local news, views, arts, entertainment and community event and business information.
Issue link: https://www.epageflip.net/i/1418713
24 UCW OCTOBER 13-19, 2021 Best of Fayetteville 910.977.1001 910.977.1001 951 S McPherson Church Road | Fayetteville, NC 9 years in a row! 9 years in a row! Thank You for voting us Thank You for voting us and now • Computer Systems Management • Cloud IP Telephone Systems • Managed Services • Cloud Computing • Server Migration/Deployment • Telephone System Installation/Repair • Network/Internet/VPN Design • Multi-Site Support • System Design/Consulting • Voice/Data/Fiber Cabling • Virtual Server Implementation • System Maintenance/Repair 2021 and now BEST I.T. SERVICE BEST COMPUTER REPAIR FEATURE Take steps to protect your devices from cyber attacks a STAFF REPORT Cyberattacks are on the rise. Highly publicized attacks like the one that targeted Colonial Pipeline in May 2021 have sent multibillion dollar businesses into crisis mode, and such attacks affect everyone, includ- ing private citizens. e rise in remote working that resulted due to the CO- VID-19 pandemic has exposed IT vulnerabilities that put busi- nesses big and small in precar- ious positions. Ransomware attacks, in which perpetrators seek ransoms after infiltrating and shutting down a network, often target businesses and not individuals. However, cyber criminals can gain access to businesses through their unsuspecting employees, especially when those workers are working remotely. Individuals can take steps to protect their devices from cyber attacks in an effort to make their personal and professional information more secure. According to Ready.gov, a website created by the United States govern- ment that's designed to educate and empower people to prepare for all types of emergencies, including cy- berattacks, offers the following tips to individuals looking to protect them- selves from cyberattacks. Be mindful of what you share on- line. Limit the personal information you post and share online. Turn off location features and make use of the privacy settings on all of your devices. -Keep software applications and operating systems up-to-date. Updat- ing apps and your OS ensures your devices have the most current safety features, making you less vulnerable to cyberattacks. Prioritize safe passwords. Utilize a password manager and use upper and lowercase letters, numbers and special characters when creating passwords. Two-factor authentication (two meth- ods of verification) should always be used when available. Be suspicious when solicited. Be suspicious of anyone or any message that asks you to do something right away, offers something that sounds too good to be true or requires you to enter your personal information. ink before you click, and when in doubt, do not click. Never provide per- sonal information if you're suspicious or using websites that do not typically require such information. Use encrypted (secure) Internet communications. Use a secure Inter- net connection and Wi-Fi network to protect your home and/or business. If a network is lagging, resist the tempta- tion to seek an available yet less secure connection. Make accessing your devices as personal as possible. A strong authentication, such as a personal identification number or password that only you would know, can make devices less vulnerable to attacks. Consider using a separate device that can receive a code or requests a biometric scan (e.g., fingerprint scan- ner or facial recognition) before allow- ing access. Check your account statements and credit reports regularly. Only share personal information on secure sites (e.g. "https://"). Do not use sites with invalid certificates. Use a Virtual Private Network, or VPN, which creates a more secure connec- tion. is is especially important for remote workers. Employ additional means to block threats. Antivirus solutions, malware and firewalls can block cyberattacks before users even have an opportunity to respond. Back up files. Routinely back up your files in an encrypted file or en- crypted file storage device so you can access them should you ultimately fall victim to an attack. Protect your home network by changing the administrative and Wi-Fi passwords regularly. When configuring your router, use either the instruction manual or speak to your internet-cable provider to set up the Wi-Fi Protected Access 2 (WPA2) Advanced Encryption Standard (AES) setting, which is the strongest encryp- tion option.