[{"@context":"https:\/\/schema.org\/","@type":"BlogPosting","@id":"https:\/\/univista.com\/posts\/the-ping-the-most-important-skills-to-keep-you-safe-in-the-cybersecurity-age\/#BlogPosting","mainEntityOfPage":"https:\/\/univista.com\/posts\/the-ping-the-most-important-skills-to-keep-you-safe-in-the-cybersecurity-age\/","headline":"The Ping: The most important skills to keep you safe in the CyberSecurity age\u00a0","name":"The Ping: The most important skills to keep you safe in the CyberSecurity age\u00a0","description":"In honor of National Cybersecurity Month, we here at UniVista would like to give you some tips and tricks to staying safe in a cyber world!","datePublished":"2019-10-22","dateModified":"2020-08-07","author":{"@type":"Person","@id":"https:\/\/univista.com\/posts\/author\/corie-bogan\/#Person","name":"Corie Bogan","url":"https:\/\/univista.com\/posts\/author\/corie-bogan\/","identifier":5,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"UniVista","logo":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2019\/10\/cybersecurity-e1571774530888.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2019\/10\/cybersecurity-e1571774530888.png","height":464,"width":601},"url":"https:\/\/univista.com\/posts\/the-ping-the-most-important-skills-to-keep-you-safe-in-the-cybersecurity-age\/","about":["business management","internet","malware","safety","Security","The Ping","update","vulnerability"],"wordCount":567,"keywords":["compliance","cybersecurity","end of life","Security","updates","Virus"],"articleBody":"ShareTweet                                        Did you know that October is&nbsp;National&nbsp;Cybersecurity&nbsp;Month?&nbsp;This seems appropriate since&nbsp;Cybersecurity&nbsp;exploits and hacks have kept&nbsp;the news buzzing&nbsp;through the summer.&nbsp;That\u2019s why we\u2019re&nbsp;going to take this&nbsp;time to remind you of&nbsp;the&nbsp;best&nbsp;cybersecurity&nbsp;practices&nbsp;you can implement to&nbsp;keep yourself safe.&nbsp;&nbsp;Training&nbsp;The first step&nbsp;you should take to&nbsp;prevent&nbsp;your&nbsp;company&nbsp;from being the victim of a&nbsp;cybersecurity issue is to&nbsp;educate yourself and your staff!&nbsp;This will also help&nbsp;your staff&nbsp;to exercise caution and good judgement&nbsp;when the situation occurs.&nbsp;Our Cybersecurity Suite&nbsp;does just that! Included in&nbsp;all&nbsp;our Comprehensive Agreements, our Cybersecurity Suite helps train staff to be&nbsp;vigilant.&nbsp;When&nbsp;an employee does inevitably receive a suspicious email, they\u2019ll know to try and contact the supposed sender before clicking links or opening attachments.&nbsp;This can save you a lot of time and money in&nbsp;the long run in case the email&nbsp;is&nbsp;fraudulent.&nbsp;&nbsp;Updates&nbsp;Are you aware that continuing to use a machine that can no longer receive updates can put you,&nbsp;your business associates, family and friends&nbsp;at risk? If a hacker gains access to your machine, they can use that same malware to obtain access to your contacts.&nbsp;Once they are on your system and inside your network a hacker can also easily gain access to any other system on your network.&nbsp;In&nbsp;The Ping: End of Life \u2013 Server and Desktop&nbsp;we discussed the issues that your company could face. These include, but are not limited to, the degradation of your system performance, vulnerabilities in the network, and slower performance from employees as their desktops begin to atrophy.&nbsp;Passwords&nbsp;Make sure your Password Complexity rules are strict. Some simple updates can greatly improve your security:&nbsp;&nbsp;Use a minimum of 7 characters for your passwords.&nbsp;&nbsp;Use both upper- and lower-case letters (e.g.,&nbsp;A,a,B,b, etc.).&nbsp;&nbsp;Use non-alphanumeric characters (e.g., 1, 2,&nbsp;3,!,&nbsp;@, etc.).&nbsp;&nbsp;For more information, check out&nbsp;The Ping: Security in Public Places&nbsp;&nbsp;Multi-Factor Authentication&nbsp;Multi-factor authentication is a mechanism of confirming one\u2019s identity using a combination of at least two factors or methods. The purpose of multi-factor authentication is to decrease the likelihood that your information can be compromised, and this authentication is becoming increasingly necessary over time. The following are the methods you can use to verify your identity:&nbsp;Something you&nbsp;know&nbsp;(a password or an answer to a question)&nbsp;Something you&nbsp;have&nbsp;(a key fob or a cell phone that generates a time expired key code)&nbsp;Something you&nbsp;are&nbsp;(a fingerprint or an iris scan)&nbsp;It\u2019s important to note that Cybersecurity isn\u2019t a concept you learn once and set aside. Cybersecurity is an ever-changing&nbsp;beast that you&nbsp;have to&nbsp;keep up with to ensure your safety. Stay tuned for our next article on an Internet of Things update.&nbsp;Your&nbsp;UniVista&nbsp;Team*Celebrating 21&nbsp;Years of Customer Satisfaction*&nbsp;ShareTweet                                        "},{"@context":"https:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Posts","item":"https:\/\/univista.com\/posts\/#breadcrumbitem"},{"@type":"ListItem","position":2,"name":"The Ping: The most important skills to keep you safe in the CyberSecurity age\u00a0","item":"https:\/\/univista.com\/posts\/the-ping-the-most-important-skills-to-keep-you-safe-in-the-cybersecurity-age\/#breadcrumbitem"}]}]