Skip to content

Have You Talked to Your Team About Data Security?

Have You Talked to Your Team About Data Security?

Sometimes, when I start talking to an audience about data security, I can see people’s shoulders start relaxing. Almost always, these shoulders belong to the owners of small businesses: they’re convinced that for whatever reason, their business data isn’t valuable enough to interest hackers. “We’re so small we don’t even have proper file sharing,” one entrepreneur told me. “We just use Google Drive for everything.”

[Tweet “Did you know that Google Drive is one of the sites hackers target most frequently?”]

Did you know that Google Drive is one of the sites hackers target most frequently? The bad guys don’t know how valuable your data is or isn’t until they can see what they’ve taken, so you can’t really consider yourself too small for them to bother with. Remember too that you need to protect not only your data but your ability to access your data: hackers make money with ransomware attacks by locking up data files and barring you from them. This can lead to catastrophic business interruptions, so business owners pay the ransom.

Data security is important to every business owner. Here are three things you can do right now to improve your data security:

1) Make sure you know where your data is and who has access to it.

Is your business data stored on the hard drive of your computer? In the cloud? On a server? In multiple devices owned by your employees? For many business owners, the answer can be a combination of all of these. As a best practice, take control of your data: make sure you know where it is, and who has access to it. Limit access to an as-needed basis, and have processes in place to terminate data access to people who no longer work for you – including third party service providers, agencies, and the like.

2) Get real about personal device usage.

Your team members may be doing work from their own personal computers, tablets, and smartphones. What happens to your business if their tech gets stolen? At a minimum, insist on the following for any device that accesses your business data: lock screen codes, anti-theft apps that include the ability to wipe device data remotely, and app locks that prevent unrelated apps on your employees’ devices from leaking your business data through unintentional or planned access points.

3) Be better about backups

Every business needs onsite and remote backups in place, and backups should be occurring regularly. Backups are important in the event of a ransomware attack – you don’t need to pay to access data that’s being held ransom if you have your own files available to you via your backups – but they’re also critical to have in case of a natural disaster, extreme weather event, or other unforeseen business disruption.

Book FREE Trial

We know that getting back into fitness is tough! Let us help you achieve your weight boxing workouts.

Creative Director/Senior Designer

Tom DiGrazia

With over a decade and a half of professional design experience, Tom brings his knowledge of design principles and focus on user experience to every aspect of his contribution to TTG. Paying special attention to each client’s brand, personalized needs and individual interests, he strives to create compelling concepts utilizing intuitive and highly-refined design solutions. In addition to traditional and digital design work and oversight at TTG, Tom also boasts a wide portfolio of web development projects with the company, allowing him to stretch his CSS and HTML skills across multiple platforms and disciplines. He feels that being a designer in the digital landscape of websites, eCommerce solutions, email marketing platforms and social media, it is important to understand the code that goes into these areas as it assists his ability to tailor designs specifically targeted to achieve the best end result and further builds understanding and communication with backend development teams.

In his off hours, Tom is an avid pop culture enthusiast, staying up to date on the latest shows, films, comics and games. He can also typically be found taking part in a whole host of artistic activities that help him further stretch his creative legs. Regardless of the activity, Tom is always accompanied by his dog, Eli, and his cat, Tib.

Specialties:
Design, Photography, Illustration, Digital Imagery Manipulation, Wesbite Development

Platforms/Tools:
Photoshop, Illustrator, InDesign, Lightroom, HTML/CSS, Wordpress

Analyst/Strategist

Courtney Dumont

As Senior Marketing Strategist & Analyst at Technology Therapy Group, Courtney is energized by the ability to flex both her left and right brain daily. Courtney discovered her passion for Marketing at Bryant University, where she spearheaded research on students’ perceptions of Social Media Marketing for her Honors Capstone Project. After graduating Bryant in 2012, she joined the Technology Therapy team, where she’s honed her skills in social media, search and social advertising, email marketing, SEO, and more.

Since joining the team, Courtney has created digital marketing strategies and managed campaigns for clients across the country, ranging from plastic surgery centers, to jewelry stores, to construction companies. With a cohesive, cross-channel approach and a focus on data-driven decision making, she has increased their leads by up to 217%. But Courtney doesn’t leave her zeal for social media at the office; she also runs a local foodie Instagram account with her husband to document their meals across Rhode Island and beyond. Check them out: @hoppilyfed.

Specialties:
Marketing Strategy, Data Analysis, Google Ads, Facebook Ads, Social Media

Platforms/Tools:
Google Analytics, Google Ads, Facebook Ads, Facebook Creator Studio, Instagram, Klaviyo, Mailchimp, Emma Mail, Google Data Studio, WordPress, YouTube, LinkedIn, Facebook, Microsoft Office