<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Security | Orinoco 360 LLC</title>
	<atom:link href="https://www.orinoco360.com/tag/cyber-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.orinoco360.com</link>
	<description>IT Security Consulting Services</description>
	<lastBuildDate>Fri, 20 Jun 2025 13:05:34 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.orinoco360.com/wp-content/uploads/2017/02/cropped-network-icon-68334-1-32x32.png</url>
	<title>Cyber Security | Orinoco 360 LLC</title>
	<link>https://www.orinoco360.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Safeguard Your Business with Orinoco 360</title>
		<link>https://www.orinoco360.com/safeguard-your-business-with-orinoco-360/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=safeguard-your-business-with-orinoco-360</link>
		
		<dc:creator><![CDATA[Pedro Dominguez]]></dc:creator>
		<pubDate>Fri, 21 Jul 2023 17:54:31 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IT Security Services]]></category>
		<guid isPermaLink="false">https://www.orinoco360.com/?p=4165</guid>

					<description><![CDATA[<p>Your business's future depends on its ability to adapt and protect itself from cyber threats. Orinoco 360 safeguards your intellectual property and reputation.</p>
The post <a href="https://www.orinoco360.com/safeguard-your-business-with-orinoco-360/">Safeguard Your Business with Orinoco 360</a> first appeared on <a href="https://www.orinoco360.com">Orinoco 360 LLC</a>.]]></description>
										<content:encoded><![CDATA[<p>In today&#8217;s ever-evolving digital landscape, maintaining the security of your intellectual property and business reputation is non-negotiable. One of the most effective ways to fortify your defenses is by ensuring your software is up to date and fostering consistency across your team&#8217;s platform usage. At <a href="https://www.orinoco360.com/">Orinoco 360</a> we are dedicated to safeguarding your business, We can&#8217;t stress enough how crucial these practices are in protecting your valuable assets. So, let&#8217;s dive into the nitty-gritty and see why staying up-to-date matters!</p>
<h1><img fetchpriority="high" decoding="async" class="aligncenter wp-image-4168 size-large" src="http://www.orinoco360.com/wp-content/uploads/2023/07/Embrace-Team-Consistency-1024x561.jpeg" alt="" width="800" height="438" srcset="https://www.orinoco360.com/wp-content/uploads/2023/07/Embrace-Team-Consistency-1024x561.jpeg 1024w, https://www.orinoco360.com/wp-content/uploads/2023/07/Embrace-Team-Consistency-300x164.jpeg 300w, https://www.orinoco360.com/wp-content/uploads/2023/07/Embrace-Team-Consistency-768x420.jpeg 768w, https://www.orinoco360.com/wp-content/uploads/2023/07/Embrace-Team-Consistency-1536x841.jpeg 1536w, https://www.orinoco360.com/wp-content/uploads/2023/07/Embrace-Team-Consistency.jpeg 1600w" sizes="(max-width: 800px) 100vw, 800px" /></h1>
<p>Your business&#8217;s intellectual property (IP) is the heart of your competitive advantage, making it a prime target for cybercriminals. By keeping your software updated, you gain access to the latest security patches and defense mechanisms, sealing off potential vulnerabilities that could jeopardize your intellectual assets. With each passing day, cyber threats are becoming more sophisticated, which is why it&#8217;s crucial to act with a sense of urgency. Don&#8217;t wait for an attack to happen before taking action! Prioritize your business&#8217;s security today.</p>
<blockquote><p>Microsoft accounted for 29% of all brand phishing attempts, moving from third place in Q1 2023 to the top spot in Q2</p></blockquote>
<h1><strong>Safeguard Your Business Reputation</strong></h1>
<p>Clients and partners trust secure businesses. Consistency in your platform fosters professionalism, reliability, and trustworthiness.</p>
<p>Your business&#8217;s reputation is like a fragile vase—once broken, it&#8217;s tough to mend. Data breaches and cyber-attacks can wreak havoc on your brand&#8217;s reputation, leading to a loss of customer trust and credibility. Imagine the consequences of a security breach being plastered all over social media and news outlets—yikes! Keeping your software updated helps you stay one step ahead of potential threats, proving to your customers and partners that you take their security and privacy seriously.</p>
<p>Outdated software exposes your sensitive data to potential breaches. Keep it locked down with the latest updates and fortified defenses.</p>
<h1><strong>Embrace Team Consistency</strong></h1>
<p>Inconsistent platforms lead to inefficiencies and misunderstandings. Streamline your operations and boost productivity by ensuring everyone&#8217;s on the same page.</p>
<p>Inconsistent platform usage within your team can lead to inefficiencies and communication breakdowns. Adopting a uniform platform ensures everyone is on the same page, promoting seamless collaboration and streamlining workflows. Whether it&#8217;s file sharing, project management, or communication tools, maintaining a consistent tech stack enhances productivity and saves time, ultimately leading to a more agile and competitive business.</p>
<h3><a title="Orinoco360 IT Support and Security Services" href="https://www.orinoco360.com/#contact" target="_blank" rel="noopener"><strong>Ready to Take Action? Schedule a Consultation Today!</strong></a></h3>
<p><a href="https://www.orinoco360.com/#contact"><img decoding="async" class="aligncenter size-large wp-image-4170" src="http://www.orinoco360.com/wp-content/uploads/2023/07/Cybersecurity-Risk-Consequences-for-businesses-1024x682.jpg" alt="" width="800" height="533" srcset="https://www.orinoco360.com/wp-content/uploads/2023/07/Cybersecurity-Risk-Consequences-for-businesses-1024x682.jpg 1024w, https://www.orinoco360.com/wp-content/uploads/2023/07/Cybersecurity-Risk-Consequences-for-businesses-300x200.jpg 300w, https://www.orinoco360.com/wp-content/uploads/2023/07/Cybersecurity-Risk-Consequences-for-businesses-768x512.jpg 768w, https://www.orinoco360.com/wp-content/uploads/2023/07/Cybersecurity-Risk-Consequences-for-businesses-1536x1024.jpg 1536w, https://www.orinoco360.com/wp-content/uploads/2023/07/Cybersecurity-Risk-Consequences-for-businesses-272x182.jpg 272w, https://www.orinoco360.com/wp-content/uploads/2023/07/Cybersecurity-Risk-Consequences-for-businesses.jpg 2000w" sizes="(max-width: 800px) 100vw, 800px" /></a></p>
<p>Your business&#8217;s future depends on its ability to adapt and protect itself from cyber threats. Don&#8217;t leave your intellectual property and reputation vulnerable to attacks. At Orinoco 360, we are committed to guiding you through the process of securing your business with up-to-date software and consistent platforms. We&#8217;ll work together to assess your unique needs, design a robust security strategy, and implement the best solutions tailored to your business.</p>
<p>At Orinoco 360 we&#8217;ve got you covered! Our experts can help you implement robust security measures, keep your systems up-to-date, and create a uniform platform for your team.</p>
<p>Don&#8217;t wait! Reach out to us now to schedule a consultation and secure your business&#8217;s success. Let&#8217;s fortify your defenses and elevate your reputation together.</p>
<p><em>(P.S.: Don&#8217;t wait too long; threats are out there, and your business deserves the best protection!)</em></p>
<p>Reference article from <a title="Microsoft Dominates as the Most Impersonated Brand for Phishing Scams in Q2 2023" href="https://blog.checkpoint.com/security/microsoft-dominates-as-the-most-impersonated-brand-for-phishing-scams-in-q2-2023/" target="_blank" rel="noopener">Leader in Cyber Security Solutions | Check Point Software</a></p>
<p>[ninja_form id=1]</p>The post <a href="https://www.orinoco360.com/safeguard-your-business-with-orinoco-360/">Safeguard Your Business with Orinoco 360</a> first appeared on <a href="https://www.orinoco360.com">Orinoco 360 LLC</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What and why is HIPAA so important?</title>
		<link>https://www.orinoco360.com/10-most-important-technology-requirements-for-hipaa-compliance/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=10-most-important-technology-requirements-for-hipaa-compliance</link>
		
		<dc:creator><![CDATA[Pedro Dominguez]]></dc:creator>
		<pubDate>Wed, 21 Jun 2023 13:19:00 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[disaster recovery]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[IT training]]></category>
		<category><![CDATA[Security Awareness Training]]></category>
		<guid isPermaLink="false">https://www.orinoco360.com/?p=4080</guid>

					<description><![CDATA[<p>It's important to note that HIPAA compliance is a complex and ongoing process, and organizations should consult legal and cybersecurity professionals</p>
The post <a href="https://www.orinoco360.com/10-most-important-technology-requirements-for-hipaa-compliance/">What and why is HIPAA so important?</a> first appeared on <a href="https://www.orinoco360.com">Orinoco 360 LLC</a>.]]></description>
										<content:encoded><![CDATA[<p>HIPAA (Health Insurance Portability and Accountability Act) is a set of regulations in the United States that governs the privacy, security, and confidentiality of protected health information (PHI). To achieve HIPAA compliance, healthcare organizations (dental offices, medical private practices, urgent care offices, and more) must meet certain technical requirements.</p>
<blockquote><p>“Failure to implement mobile device security by Covered Entities and Business Associates puts individuals’ sensitive health information at risk. This disregard for security can result in a serious breach, which affects each individual whose information is left unprotected.”</p></blockquote>
<p><img decoding="async" class="aligncenter wp-image-4084" src="http://www.orinoco360.com/wp-content/uploads/2023/06/Medical-Record-Security-services-for-health-care-practices-1024x683.jpg" alt="Healthcare compliance usually involves three main areas: patient safety, patient privacy, and billing of services." width="713" height="476" srcset="https://www.orinoco360.com/wp-content/uploads/2023/06/Medical-Record-Security-services-for-health-care-practices-1024x683.jpg 1024w, https://www.orinoco360.com/wp-content/uploads/2023/06/Medical-Record-Security-services-for-health-care-practices-300x200.jpg 300w, https://www.orinoco360.com/wp-content/uploads/2023/06/Medical-Record-Security-services-for-health-care-practices-768x512.jpg 768w, https://www.orinoco360.com/wp-content/uploads/2023/06/Medical-Record-Security-services-for-health-care-practices-1536x1024.jpg 1536w, https://www.orinoco360.com/wp-content/uploads/2023/06/Medical-Record-Security-services-for-health-care-practices-2048x1365.jpg 2048w, https://www.orinoco360.com/wp-content/uploads/2023/06/Medical-Record-Security-services-for-health-care-practices-272x182.jpg 272w" sizes="(max-width: 713px) 100vw, 713px" /></p>
<h2><strong>10 most important technology requirements for HIPAA compliance</strong></h2>
<ol>
<li><strong>Access Control:</strong> Implement secure access controls to ensure that only authorized individuals can access PHI. This includes <a title="Manage Strong Passwords in your healthcare practice" href="https://www.orinoco360.com/strengthen-digital-security-with-password-management/" target="_blank" rel="noopener">strong passwords</a>, multi-factor authentication, and user role-based access controls.</li>
<li><strong>Encryption:</strong> Encrypt PHI both in transit and at rest. This includes using secure protocols (e.g., HTTPS) for data transmission and encrypting data stored on devices, servers, and databases.</li>
<li><strong>Audit Controls:</strong> Maintain audit trails and implement systems to record and monitor access to PHI. This helps track and review activities related to PHI, ensuring accountability and detecting any unauthorized access or breaches.</li>
<li><strong>Secure Communications:</strong> Use secure methods to transmit PHI, such as encrypted email or secure messaging platforms, to protect data during transmission and prevent unauthorized interception.</li>
<li><strong>Disaster Recovery and Data Backup:</strong> Establish data backup and disaster recovery plans to ensure the availability and integrity of PHI in the event of a system failure, natural disaster, or other emergencies.</li>
<li><strong>Physical Security:</strong> Implement safeguards to protect physical access to areas where PHI is stored, such as data centers, servers, and offices. This includes measures like secure locks, access control systems, and surveillance cameras.</li>
<li><strong>Risk Assessment and Management:</strong> Conduct regular risk assessments to identify potential vulnerabilities and security risks to PHI. Implement risk management strategies to mitigate these risks effectively.</li>
<li><strong>Employee Training:</strong> Provide <em>security awareness training</em>, HIPAA regulations, privacy practices, and security protocols. This ensures that staff members understand their responsibilities in handling PHI and are aware of potential risks and best practices.<br />
<blockquote><p>Security awareness training is&nbsp;<b>a strategy used by business owners and security professionals to prevent and mitigate user risk</b>.</p></blockquote>
</li>
<li><strong>Business Associate Agreements:</strong> Establish agreements with business associates who handle PHI on behalf of the healthcare organization. These agreements ensure that the business associates comply with HIPAA regulations and maintain the privacy and security of PHI.</li>
<li><strong>Security Incident Response:</strong> Develop and implement an incident response plan to handle security incidents, data breaches, and unauthorized disclosures promptly. This includes protocols for reporting incidents, conducting investigations, and notifying affected individuals as required by HIPAA.</li>
</ol>
<p>It&#8217;s important to note that HIPAA compliance is a complex and ongoing process, and organizations should consult legal and cybersecurity professionals like <a title="Cybersecurity Professionals and IT Services" href="https://www.orinoco360.com/" target="_blank" rel="noopener">Orinoco 360</a> to ensure they meet all necessary requirements and maintain compliance over time.</p>
<h4>Let Orinoco 360 help you implement the level of security that your practice needs. Contact us today to schedule a free consultation.</h4>
<p>[ninja_form id=1]</p>
<p>Reference <a title="$2.5 million settlement shows that not understanding HIPAA requirements creates risk" href="https://www.hhs.gov/about/news/2017/04/24/2-5-million-settlement-shows-not-understanding-hipaa-requirements-creates-risk.html" target="_blank" rel="noopener nofollow">article from HHS.gov</a></p>
<p>Reference <a title="10 Best Practices for HIPAA Compliance" href="https://www.medsafe.com/blog/hipaa-compliance/10-best-practices-for-hipaa-compliance" target="_blank" rel="noopener">article from MedSafe.com</a></p>The post <a href="https://www.orinoco360.com/10-most-important-technology-requirements-for-hipaa-compliance/">What and why is HIPAA so important?</a> first appeared on <a href="https://www.orinoco360.com">Orinoco 360 LLC</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>10 Security Tips for Business Owners and Employees</title>
		<link>https://www.orinoco360.com/10-security-tips-for-business-owners-and-employees/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=10-security-tips-for-business-owners-and-employees</link>
					<comments>https://www.orinoco360.com/10-security-tips-for-business-owners-and-employees/#respond</comments>
		
		<dc:creator><![CDATA[Pedro Dominguez]]></dc:creator>
		<pubDate>Wed, 06 Mar 2019 05:14:37 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Business Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Security Tips]]></category>
		<guid isPermaLink="false">http://www.orinoco360.com/?p=1610</guid>

					<description><![CDATA[<p>Cyber Security should always be in the back of you mind at home, at work and even in your own business. Cyber criminals are always looking for ways to gain ...</p>
The post <a href="https://www.orinoco360.com/10-security-tips-for-business-owners-and-employees/">10 Security Tips for Business Owners and Employees</a> first appeared on <a href="https://www.orinoco360.com">Orinoco 360 LLC</a>.]]></description>
										<content:encoded><![CDATA[<figure class="wp-block-image alignfull"><img loading="lazy" decoding="async" width="640" height="385" src="http://www.orinoco360.com/wp-content/uploads/2019/03/Top-10-Security-Tips-For-Your-Business.png" alt="" class="wp-image-1615" srcset="https://www.orinoco360.com/wp-content/uploads/2019/03/Top-10-Security-Tips-For-Your-Business.png 640w, https://www.orinoco360.com/wp-content/uploads/2019/03/Top-10-Security-Tips-For-Your-Business-300x180.png 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<p>Cyber Security should always be in the back of you mind at home, at work and even in your own business. Cyber criminals are always looking for ways to gain access to personal information and, believe or not, sometimes the answers and passwords we use are hidden in plan sight.</p>



<p>These are 10 basic tips we recommend to our clients and friends at all times. For more advanced security, our services are always available. Please note, there is no special order for any of them, they are just tips you should try to be aware of.</p>



<h2 class="wp-block-heading">1. Backup and Redundancy</h2>



<p>It is important to keep a backup of all your data, not only because your device could get lost or stolen, but because <a href="http://www.orinoco360.com/how-do-ransomware-works/">Ransomware</a> is here to stay. We know your family pictures mean the world to you. Databases, Software Licenses, contracts, purchase orders and invoices of your customers are the bread and butter of your company. Why not <g class="gr_ gr_496 gr-alert gr_gramm gr_inline_cards gr_run_anim Grammar multiReplace" id="496" data-gr-id="496">having</g> a redundant system that helps you protect it?</p>



<p>There are simple solutions nowadays that do that automatically for you. <a rel="noreferrer noopener nofollow" aria-label="Carbonite (opens in a new tab)" href="https://partners.carbonite.com/orinoco360" target="_blank">Carbonite</a> is one of them, it is software that makes copies of your documents and keeps different versions of them on their secured &#8220;<a href="http://www.orinoco360.com/how-can-the-cloud-work-for-my-business/" target="_blank" rel="noreferrer noopener" aria-label="cloud (opens in a new tab)">cloud</a>&#8220;. This protects your data from hardware failure, ransomware attacks <g class="gr_ gr_185 gr-alert gr_gramm gr_inline_cards gr_disable_anim_appear Punctuation only-ins replaceWithoutSep" id="185" data-gr-id="185">and</g> even a lost device.</p>



<h2 class="wp-block-heading">2. Keep your devices up to date</h2>



<p>Having your computer or mobile device up to date with the latest updates is an important part of securing your information. Sometimes these updates are not tested correctly when they get <g class="gr_ gr_43 gr-alert gr_gramm gr_inline_cards gr_run_anim Grammar only-ins doubleReplace replaceWithoutSep" id="43" data-gr-id="43">release</g> to the public, but most manufacturers are getting better at it every day. </p>



<p>We recommend using web browsers like Google Chrome or Firefox, these browsers are always releasing new patches and updates to make their products more secure.</p>



<h2 class="wp-block-heading">3. Vintage Technology</h2>



<p>From time to time you would <g class="gr_ gr_79 gr-alert gr_gramm gr_inline_cards gr_run_anim Grammar multiReplace" id="79" data-gr-id="79">be <g class="gr_ gr_76 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling ins-del" id="76" data-gr-id="76">surprise</g></g> how many companies still require you to send them a &#8220;fax&#8221;, worst is to have them require a credit card authorizations to be completed in full and sent via fax. There is an entire generation of new employees in offices around this country that have no idea what a fax is, yet, they need to learn on the fly how to send or receive one.</p>



<p>If you are a business owner and are require to have a fax machine for compliance regulation purposes, please make sure the machine is in a secluded and secure location (inside of someone&#8217;s office). Also, please make sure to archive or destroy the fax after you use it. The best alternative to fax is an email-fax alternative like <a href="http://myfax.7eer.net/c/352763/122105/1590" target="_blank" rel="noreferrer noopener nofollow" aria-label="MyFax (opens in a new tab)">MyFax</a>, all your faxes are managed using your email client.</p>



<p>If a company requires to send a fax, please ask of an alternate delivery method (email or web form). If there is not choice, please follow up to make sure they received the information and manipulate the data securely.</p>



<h2 class="wp-block-heading">4. If it is not your device DO NOT LOGIN</h2>



<p>If you need to check your email, log in to your bank account or make an <g class="gr_ gr_97 gr-alert gr_spell gr_inline_cards gr_disable_anim_appear ContextualSpelling ins-del multiReplace" id="97" data-gr-id="97">onine</g> purchase and you do not have your personal device, ask yourself: &#8220;Can this wait?, can I do this later once I get to my computer?&#8221;. It is never a good idea to login to your personal information using an unknown device or network. Your data could be copied or stolen.<br></p>



<p>If, <strong>and only if</strong>, you need to login to your bank account, email or any other personal online account because it is an emergency, we suggest you try to using Incognito mode in Google Chrome or In Private session in Microsoft Edge to access the account and make sure you log out once you are done. Once you regain access to your trusted computer, change your password immediately!</p>



<h2 class="wp-block-heading">5. If you don&#8217;t need WiFi, don&#8217;t use it</h2>



<p>Most cellphone wireless plans nowadays offer unlimited data.  There is no reason or excuse to jump on a wireless network these days, especially public wireless networks. In some cases, you might be lucky enough to get the cubicle or office with the dead spot in the entire building and you might get little to no signal. If you are the lucky one, and there is no other form of communication around, then you should close all your apps on your cell phone and use the guest wireless network whenever you need it.</p>



<p>If you need to use WiFi, we recommend you use a VPN connection like <a href="http://keepsolid.pxf.io/c/352763/348318/5159" target="_blank" rel="noreferrer noopener nofollow" aria-label="VPN Unlimited (opens in a new tab)">VPN Unlimited</a> to prevent any data monitoring.</p>



<h2 class="wp-block-heading">6. Rotate your passwords</h2>



<p>You will be surprise how many times we encounter users that still use, in 2019, passwords like &#8220;<em>Password123</em>&#8221; or &#8220;<em>Snoopy99</em>&#8221; for every account they use online.</p>



<p>This is why we always recommend our users from rotating their passwords at least every 6 months. As we said at the beginning of the post, every day new threats are being created to attack your devices and to gain access to your passwords, sometimes you don&#8217;t even know your password is compromised. </p>



<p>We recommend using services like <a rel="noreferrer noopener" aria-label="Dashlane (opens in a new tab)" href="http://bit.ly/DashlaneOrinoco360" target="_blank">Dashlane</a>, it offers a one-click solution to all your passwords and you don&#8217;t even have to remember any of them, you only need ONE single password to access your <a rel="noreferrer noopener" aria-label="Dashlane platform (opens in a new tab)" href="http://bit.ly/DashlaneOrinoco360" target="_blank">Dashlane platform</a>. Dashlane can also rotate your passwords as you request. They accommodate to complexity and regulations with all the accounts you manage. </p>



<p>Want to know if your password has been compromised? Check this out: https://haveibeenpwned.com</p>



<h2 class="wp-block-heading">7. Social Engineering</h2>



<p>Social Engineering is the way to gain access to corporate resources using intimidation, threat or even pretending to be the &#8220;fly on the wall&#8221;. </p>



<p>For example, If you see a stranger in wondering around the office, present yourself, and make sure they are in the right place or at least help them find the person they are looking for. You would be surprised how many &#8220;random&#8221; people walk around offices plugin in USB flash drives in employee&#8217;s computers.</p>



<p>If someone calls you or emails you &#8220;by accident&#8221; and attempts to get information from you through manipulation or intimidation, there is nothing wrong with saying no or not even answering back. You need to report the incident immediately to a superior or your IT Team to activate security procedures.</p>



<h2 class="wp-block-heading">8. Share less in social networks</h2>



<p>Social networks are the main source of important information in our lives, where we work, where we went to school, your friend&#8217;s information, your best vacation spot, etc. It is important to share the least amount of information, keep your profile secured and prevent accepting friend requests from unknown accounts. </p>



<h2 class="wp-block-heading">9. Be careful where you click</h2>



<p><em>When in doubt, please don&#8217;t click on it.</em> If you receive an attachment from an unknown sender, or an email that looks suspicious or out of order, please don&#8217;t click on it. Make sure you delete it and/or report it to the IT team to make sure someone else in your organization hasn&#8217;t fallen victim. Spam filters are always a little step behind the latest phishing trends. </p>



<p>Think you got what is takes to spot a fake site? Give it a try to this <a href="https://www.opendns.com/phishing-quiz/" target="_blank" rel="noreferrer noopener" aria-label="Phishing Quiz (opens in a new tab)">Phishing Quiz</a><br></p>



<h2 class="wp-block-heading">10. Lock your computer up! </h2>



<p>Always lock up your devices with a password before leaving them unattended, whether you use a Windows PC, an Apple computer or any other type of device, you should always have a way to lock up your device before you leave it unattended and always password protected. If you keep important information in a flash drive, put it away as well.</p>



<p>Sticky notes are for quick mental notes, please do not write your password on a sticky note, that defeats the purpose of this entire post!</p>



<p>If you have any questions, or if you would like us to do an assessment of your Network Security in your home or office, please make sure to fill out the information in our <a href="http://www.orinoco360.com/#contact" target="_blank" rel="noreferrer noopener" aria-label="contact form (opens in a new tab)">contact form</a>. </p>



<p></p>The post <a href="https://www.orinoco360.com/10-security-tips-for-business-owners-and-employees/">10 Security Tips for Business Owners and Employees</a> first appeared on <a href="https://www.orinoco360.com">Orinoco 360 LLC</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.orinoco360.com/10-security-tips-for-business-owners-and-employees/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
