Cybersecurity Awareness Month

by

October 5, 2020

Happy October!

If you don’t know, the month of October is Cybersecurity Awareness Month. This initiative was launched by the National Cyber Security Alliance & the U.S. Department of Homeland Security in October 2004.

To observe this, we want to share a few cybersecurity tips with you all throughout the month and learn more from you on what you have done to create a cybersecurity culture at your organization. Below is a short one question survey gauging if you feel you have a strong cybersecurity culture. For those that fill it out you have a chance to win a $50 Amazon gift card.

https://www.surveymonkey.com/r/cybersecuritymonth2020

Now, for your first tip!

Use two-factor authentication wherever possible. 

Strong passwords are an essential part of good cyber hygiene. However, it’s even more important to use two-factor or multi-factor authentication. MFA provides layered protection against unauthorized logins by using two or more of the following:

  • something you know, such as passwords
  • something you have, such as a mobile device with an authenticator app
  • something you are, such as your fingerprints

Enabling MFA wherever possible can help protect your data and your access from the bad guys.

Remember, think before you click!

{{cta(‘86170dfe-b4a8-4340-8937-dc07f788175a’,’justifycenter’)}}

We're Integris. We're always working to empower people through technology.

Keep reading

Strong Cybersecurity Postures: How to Unleash their Power

Strong Cybersecurity Postures: How to Unleash their Power

In the vast digital landscape where virtual dragons and sneaky trolls roam a strong cybersecurity posture has never been more important. Imagine a band of modern-day knights led by our protagonist, Alex. Armed with a trusty laptop and a cup of coffee, Alex navigates...

How to Spot a Phishing Attack in 2023

How to Spot a Phishing Attack in 2023

In 2023 cyber threats lurk behind every tree trunk in today's digital jungle, and cybersecurity awareness is more critical than ever. Among the craftiest of these threats are phishing attacks. Phishing attacks are cunningly engineered with social manipulation at their...

How to Choose an IT Consultant in Boulder, CO

Regardless of industry size or type, Boulder IT consultants play a massive role in the way companies in the Boulder area do business. While most companies may have their own in-house IT department, many of these departments are small and cannot handle all the...