We’ve arrived at the cusp of another new year, and just like everyone else, we’d be remiss if we didn’t spend a little time looking back. In 2015, Lieberman Technologies talked about a lot of different subjects here on our blog, but probably none as important as the issues facing tech security. There are so many ways information can be compromised, both on a large and small scale, that protecting yourself can seem like a never-ending affair. One thing is clear: it’s no longer a matter of “if” your online security is compromised, but when.
Think you’re safe? Take a look at some of the challenges we’ve seen this year, and then tell me:
- Personal data breaches – Anthem, BlueCross/BlueShield, Kaspersky Labs, LastPass… the list goes on
- Malware attacks – Cryptolocker, Cryptowall
- Phishing scams – too many to list here
- Credit card data breaches – POS systems used in restaurants and retail establishments everywhere
- Software vulnerabilities – Internet Explorer
To be sure, there are plenty of good things that have happened, security-wise, in 2015 and they’ve come about in response to the changes listed above. One of the biggest stories of 2015 is the roll-out of new credit card technology. Known by such terms as EMV cards, chip cards, and smart cards, these microchip-enabled cards are more secure for transactions than traditional magnetic-stripe credit cards because of the technology involved. Still, not all retailers have caught up with this new technology at their point-of-sale, so better transactional security is still a work in progress.
Your personal and business security will remain an important part of 2016, and to help your efforts along, I’ve compiled a list of resolutions for things you need to be doing in the coming year.
What You Need to Do in 2016
- Use a good virus/malware scanner and keep it updated
- Adopt a form of backup that fits your needs, and use it
- Stop putting sensitive and private information in email messages
- Use a password manager and start using hard passwords
- Learn about multi-factor authorization and start using it, especially for your email account
The challenges that lie ahead of us in 2016 are yet to be known, but we can help to alleviate some of the more obvious areas of concern just by taking a more proactive role in our own tech security.