Print PDF version
Please contact me about a
quick, no-obligation insurance review
First Name :
Last Name :
Captcha AntiSpam Security
Please type in the code shown in the image.
are used to prevent automated software from performing actions which degrade the quality of service of a given system, whether due to abuse or resource expenditure.
Tips To Secure The iPhones Employees Use For Work
The iPhones your employees use for work probably store sensitive data, such as client details, company financial information or proprietary data. Whether you provide the iPhones or allow employees to use their own devices, take steps to improve security.
Set a Passcode
Thieves can’t access information stored on the phone if it’s protected by a secure passcode. Recommend that employees turn on the built-in passcode feature on their iPhone or use an alphanumeric code that’s at least eight characters long.
Use Touch ID or Face ID
Certain iPhones support a Touch ID or Face ID option that provides stronger security than a fingerprint or passcode that could be guessed by a thief or a sophisticated computer program. If employees use a device with one of these options, ask them to utilize it.
Disable the Lock Screen Siri Option
Virtual assistant Siri offers help to iPhone users, but thieves can use Siri to access important information on the phone. Disabling Siri under the lock screen option improves security.
Enable Find My iPhone
The free Find My iPhone feature allows you or the police to use GPS to pinpoint the exact location of your device. It also allows users to erase data remotely. Follow the directions in the phone’s user guide to enable this feature.
Control Privacy Settings
Privacy settings prevent apps, thieves or hackers from accessing important files and data. Employees may adjust their phone’s privacy settings for maximum protection.
Avoid Jailbroken Devices
An iPhone that’s been jailbroken is susceptible to malware, viruses and other security threats. Users may jailbreak a phone to bypass Apple protocols, improve customization or install certain apps, but be sure the iPhones used for your company are not jailbroken.
Encrypt the Backups
If your company syncs employee iPhones to a computer, the stored data could be compromised by thieves or hackers. Encrypting the backup devices protects the data from anyone who doesn’t have the password while allowing your team to access it.
Install a VPN App
Public wifi is notoriously easy to hack, but a Virtual Private Network (VPN) app can add a layer of protection as it encrypts data communication. Choose from several VPN apps in the Apple store for your employee phones.
Keep the Phone Close
Employees don’t have to carry their phones 24/7, but they should know where their phone is at all times. An unattended phone can easily be stolen or lost, so remind employees to exercise awareness. They may also wish to use a sturdy holder so the phone doesn’t accidentally fall out of their purse or pocket.
Your company employees may rely on iPhones for work purposes. In addition to purchasing cybersecurity insurance, consider adding these steps to your security measures.
Glenn Insurance, Inc
The Dangers Of Fake Business Reviews
Before visiting a business, 90 percent of consumers read
. Your company needs online reviews, but your business could suffer if you encourage or allow fake reviews to populate the internet. Understand the dangers of fake reviews as you build and protect your company.
What are Fake Reviews?
As a business owner, you may solicit or allow fake reviews as a way to bolster your online reputation and attract more customers.
Four common types of fake reviews include:
Ask family members and friends to share reviews of your company. While your family and friends may be loyal customers, their reviews could be skewed and not provide an accurate picture of your company.
Pay employees to write reviews. These reviews could appear to be objective but are dishonest.
Offer your product or service for free in exchange for a written review. While you may boost production volume and customers with this technique, it invites positive rather than honest reviews.
Encourage reviews on open rather than verified review sites. Numerous review sites allow anyone to leave a review even if they haven’t tried your services or products, a practice that encourages fake reviews.
Dangers of Fake Reviews
Your company faces several dangers because of fake reviews.
- Expect repercussions from the Federal Trade Commission (FTC) and your state if you violate consumer protection laws that include false advertising.
- Online review sites can report fake reviews to consumer alert groups and post this information on your profile. As a result, your company will gain a negative reputation that is nearly impossible to overturn.
- If consumers discover that you’ve encouraged or allowed fake reviews, they will stop trusting your company. You lose credibility and valuable business that affects your company now and into the future.
Lack of Growth
- An influx of reviews can improve business temporarily, but your business will suffer if your products or services don’t match the fake reviews.
- Fake reviews of physicians, attorneys, accountants or auto repair shops could potentially harm consumers. Other dangers caused by undisclosed allergic reactions or unsafe products can also harm consumers, highlighting the need for only honest reviews.
How to Prevent Fake Reviews
In your quest to attract business and build your brand, you may ask all your customers to leave honest reviews on verified sites. Continue to offer excellent service, too, that prompts customers to praise your company online.
Overall, your company will benefit more from no reviews than from fake ones. Understand the dangers of fake reviews and how to combat them as you retain your credibility, build your reputation and protect your company.
Glenn Insurance, Inc
How To Prepare For National Cybersecurity Awareness Month In October
National Cybersecurity Awareness Month (NCSAM) occurs annually in October. Started in 2003 by the U.S. Department of Homeland Security and private sector sponsors and nonprofit collaborators that form the National Cyber Security Alliance, this annual event promotes cybersecurity and recommends resources for online safety.
Your company can make several preparations this month as you look forward to celebrating Cybersecurity Awareness Month with your employees, customers and community.
Host an Educational Event
Begin planning an open house, expo, lecture, or other educational event that focuses on cybersecurity. Depending on your company, you may decide to focus your educational efforts on information that will benefit senior citizens, college students or families. For example, your IT specialist could present advice that helps consumers avoid cybercrime, or you could show customers how to implement security protocols on their electronic devices. Get creative as you prepare to raise cybersecurity awareness during an educational event.
Cybersecurity training should occur year-round, but your employees may be especially receptive to security tips during a month that’s focused on raising awareness. Take advantage of this annual opportunity to discuss topics like choosing secure passwords, securing electronic devices used for work and managing email safety. Or choose a different topic based on your unique needs.
Focus on Different Weekly Topics
This year, NCSAM includes four weekly topics. In summary, those topics include:
Online safety at home.
Training for a cybersecurity career.
Ensuring online safety at work.
Safeguarding critical infrastructure throughout the nation.
Your company can prepare to discuss these weekly topics during your events, through customer newsletters and on social media.
Utilize Your Social Media Influence
If your company has a large social media following, you have a powerful platform to raise awareness for cybersecurity. You can write blog posts that outline the importance of cybersecurity, share information about how to join the cybersecurity workforce or detail the ways your business protects data. Also, prepare infographs and other visual aids that discuss online safety tips.
Partner with Other Companies
Like NCSAM was started through a collaboration, your company can partner with other businesses as you increase cybersecurity awareness. Share the latest cybersecurity information, create resources that educate the public about cybersecurity or host an online safety seminar together.
Check your Cybersecurity Insurance Coverage
Cybersecurity insurance protects your business in many circumstances. Review your needs with your insurance agent as you ensure you have the correct amount of cybersecurity insurance for your company.
As your business prepares to celebrate National Cybersecurity Awareness Month in October, consider taking these steps now. They give you the tools you need to raise cybersecurity awareness among your employees, customers and community.
Glenn Insurance, Inc
Ways To Secure Your Virtual Payment Terminal
With a virtual payment terminal, you can take payments over the internet. Not only will you boost sales, but you’ll also offer convenience to your customers.
Your virtual payment terminal may be vulnerable to security risks, though, so follow several tips as you reduce liability and protect your customers and business.
What is a Virtual Payment Terminal?
Your virtual payment terminal allows you to accept credit card payments without using a credit card terminal. Simply log into the virtual terminal website from your device, enter the sales amount and key in the credit card information. You’ll then receive authorization if the sale is approved and can print or email the receipt.
After each sale or when it’s convenient for you, check the transaction history to see details about your sales and processing activity. The terminal also includes performance data and financial reports, and you can adjust the admin settings.
With your virtual payment terminal, you can accept payments anywhere. You’ll also save money with lower processing fees and increased opportunities to make sales.
Security Tips for Your Virtual Payment Terminal
Your virtual payment terminal offers convenience and can boost sales, but you must secure it. You will be liable if your actions compromise a customer’s credit card number or if fraud occurs to your account.
Never store customer payment information. Use credit card data to make the sale, but never make or store a copy of the card number or other details.
virtual payment terminal provider.
Utilize fraud filters that identify potential fraud and help you respond properly.
Partner with a provider that uses Point-to-Point encryption.
Implement tokenization. It replaces data with a token and inhibits hackers.
Avoid public Wi-Fi connections that are often unsecure.
Follow all the security protocols mandated by your virtual payment terminal provider. These protocols may include annual PCI compliance training or software updates as you protect your customers’ data and company.
Limit login access. Only authorized employees should be able to log into your virtual payment terminal as you prevent unauthorized transactions or other information compromises.
Log out after each transaction or when you need to walk away from your device. This step prevents someone from accessing the terminal and information between sales.
Secure the computers, smartphones and tablets you use to access your virtual payment terminal. If possible, use
that require a pin or use fingerprint or face recognition, and store these devices in a secure location.
Your business benefits from a virtual payment terminal. Secure it as you limit your liability and protect customers and your company.
Glenn Insurance, Inc
Copyright 2018. All rights reserved.