Home Depot POS breach
When Home Depot’s POS system was breached in 2014, it raised many questions. Since the same thing had happened to Target a few months back, people started wondering, ‘are there any businesses that are safe from cyber crimes?’
With the constant advancement in technology, cybercriminals are coming up with new ways to breach networks. And although security software and networks are also being updated, cyber criminals manage to stay a step ahead.
When Home Depot was targeted, they were looking into the option of installing a security patch. Had they done this, there is a probability that the breach might not have happened.
IT Service Providers
To keep your business safe from such events, it’s important to regularly update the hardware and software technology, keep up with Microsoft patch updates & virus definition updates. When choosing a cloud-based solution for your business needs, you should go for an IT service provider who meets your security requirements.
Their services should meet the standards of industry-specific and general security such as, National Institute of Standards and Technology (NIST), Payment Card Industry (PCI) etc. Once you’re sure of their security measures, you can move on.
Best IT Security Practices
Ask questions and get familiar with the practices of your IT service provider. Even though new threats are emerging every day, most of these threats are the same ones that have been around for very long. They can be avoided if your service provider implements the following IT security practices.
- Properly Set Up Firewall
- Installs antivirus
- Backs up your data
- Data Encryption
- Is wary of phishing
- Generates centralized reports
- Regularly updates the software
- Periodically switches passwords
- Monitors privileged users’ actions
- Runs Monthly Risk Assessment
- Employee Acceptable Use Policy
- Assesses risk to formulate data security strategy