Archives - Small Business


Position your two monitors carefully for ergonomics and security

If you use two monitors, optimize their positioning. If you use each monitor about the same amount, arrange both directly in front of you, with a slight curve. If you use one more than the other, place it in front of you, and curve the other toward your dominant eye. Also, always position monitors discreetly […]

Treat business information as personal information

Business information typically includes a mix of personal and proprietary data. While you may think of trade secrets and company credit accounts, it also includes employee personally identifiable information (PII) through tax forms and payroll accounts. Do not share PII with unknown parties or over unsecured networks.

Phishing — It only takes one time

Data breaches do not typically happen when a cybercriminal has hacked into an organization’s infrastructure. Many data breaches can be traced back to a single security vulnerability, phishing attempt, or instance of accidental exposure. Be wary of unusual sources, do not click on unknown links, and delete suspicious messages immediately.

Defending against ransomware — Practical steps to take right now

Imagine being locked out of your home. Now think about someone being inside and telling you that could regain access to it, without any of your belongings being harmed, if you simply paid a fine. It’s not a situation you would ever want to be in, but it’s one that many small and midsize businesses […]

Turn on a firewall for extra protection as needed

Firewalls are staples of enterprise security and they can be useful for individuals, too. A firewall blocks incoming connections, which in some cases may be needed to protect against rogue traffic from apps like BitTorrent clients. Firewall capabilities are built into Windows and macOS.

Protect your privacy by doing business with credible companies

Before supplying any information online, consider the answers to the following questions: Do you trust the business? Is it an established organization with a credible reputation? Does the information on the site suggest that there is a concern for the privacy of user information? Is legitimate contact information provided? If you answered “No” to any […]