Sometimes discussions about online security get way too complicated. Frenzied business owners worry about everything from phishing to ransomware. In the process, they fail to consider many low-tech security issues.
However, what good is the best security app or gadget if you can’t access it or figure out how it works?
Low-Tech Online Security Issues
An article published by The Register highlights more than one issue that transcends technology. Here’s the title: “Dead LAN’s hand: IT staff ‘locked out’ of data center’s core switch after the only bloke who could log into it dies.”
‘We can replace it but we have no idea what the config is on the device’The Register
Once unimportant organizational and operational issues have suddenly become critical. This happened when an individual with key information died.
In the aftermath, the business scrambled to figure out (1) how things worked and (2) how to gain access to secure resources.
Business and Family
Low-tech online security issues such as death can affect your business and family. So, think about how you’re going to continue if a key person dies, quits, leaves, or becomes uncooperative or incapacitated.
Besides the death or departure of a person, you must also create plans for:
- Natural disasters.
- Equipment failure.
The above article gives you a good clue about how to get started:
“For the love of God, backup your configs on your networking equipment… That way if you die, someone can follow up on all of your work with all your passwords, private keys, and configs in case of a replacement situation.”
But, backups create a new set of security issues, regardless of whether you’re talking about login credentials, data, or people. So, careful planning is essential.
I work with companies to develop practical data security policies and strategies. In other words, I help to ensure continuity without increasing vulnerability.
I can help you find sensible solutions to low-tech online security problems. Contact me now to begin.
Follow and interact with Bruce Tyson on Gab, the free speech social network: https://gab.com/realBruceTyson15 Tools for an Effective Visual Marketing Campaign - Visual marketing acknowledges the role of non-verbal communications in the online space. After all, most people learn faster from looking…Facebook’s Fake Crypto - Hi! I’m just checking in to answer an important question. Now that Facebook’s fake cryptocurrency has captured some #FakeNews headlines,…Best VPNs for School - What are the best VPNs for school? I’m glad you asked. Here you will learn: How to get around the…5 Ways Entrepreneurs Overspend on Technology - Cash flow issues can strangle businesses, especially when unexpected expenses arise. For this reason, business owners should always monitor their…Remove EXIF Data from Images [Easy] - Have you ever turned off your phone camera’s location settings? If not, chances are that you’re photo includes the location…
NEW! Buy the e-book, “30 Ways to Get FREE Website Traffic in 30 Minutes or Less.” Our fast, secure checkout is powered by Square.