CCB Cybersecurity Policies and Procedures
As of January 4, 2021, we implemented the following additional procedures to protect the firm and our clients from potential Cybersecurity issues.
Did you know that since the start of the pandemic, hackers have increased their attacks by a record 40% in 2020? Small businesses are among the largest victims. As such, Conrad Cushing Bain Inc. has listed the most common hacking methods below so that you understand the seriousness of the matter, as well as how we as a company are addressing them to ensure our policies are as current and safe as possible.
No. 01 – Access point
The no.1 hacker access point is through e-mail. Because of the rising incidences of hacking, CCB has implemented even more cybersecurity features to protect client and firm data. As a result, we can only accept and send files using our ShareFile encryption software. As a client of CCB, you can use this software for your interactions with us without cost. To access this software, please contact someone in our firm who will e-mail you an Upload link that you can use to attach your files. Otherwise, if you send unencrypted files, our staff will send you a link and ask you to send the files again using the encryption software.
Please give us a call if you have any trouble using the software. We are dedicated to ensuring that we have taken all available steps to protect your data and appreciate your efforts and patience.
No. 02 – Password selection
Consider strengthening all passwords to have a combination that would withstand current hacking procedures. If your password contains a word that can be found in a dictionary, it takes less than 10 seconds to hack, even if there are further numbers and symbols. A password that contains over 7 characters, a number, a letter and a symbol takes over 900 years to hack. A password with 10 characters is even more secure.
As a client, we’d advise you to update all of your passwords so that they don’t include full words. Please use acronyms that are easier to remember as the first letter of each word of , a rhyme or a song lyric, with numbers included (inclusion of symbols adds even more security). Having an intricate, strong password is better than having different, less secure passwords for multiple things.
Example: HPB#2TCOS (Harry Potter Book #2 Chamber of Secrets)
No. 03 – Home network
Home networks pose risk to the office. Hackers can infiltrate your home network and gain access to computer. Access can be gained through any item that is connected to your WIFI. This includes NEST security cameras, ROOMBAs, routers, SMART tech items for lights and thermostats, nanny cams, etc. You should ensure that passwords for routers, WIFI and each SMART item added are strong.
No. 04 – Computer Updates
Microsoft and Apple roll out security updates all of the time. Because people get annoyed with them, the updates are not always done in a timely manner. This leaves computer equipment vulnerable to the newest forms of hacking. Updates are important and allow your computers and devices to be current in virus software.
No. 05 – WIFI access points
Another unsecured route that hackers can access your computer and device is through unsecured WIFI points. So that free WIFI at the café or the airport is dangerous, giving hackers potential access to your device while browsing.
No. 06 – USB Drop Attacks
Hackers are accessing large corporations by imprinting the company logo on USB drives, putting malicious software on it and then dropping it in parking lots outside of the building. Although chances are slim in our area, there is a risk that a USB will be brought in that has virus software on it from a computer or software downloaded it and put on the stick (i.e. picture software is commonly used).
As a safety measure we are asking clients that are bringing files in on USBs to ensure that the USBs aren’t used for other activities and if the USB was purchased by them. If it was purchased by them, the risk is lower, and if Clients have only used it for corporate backup files it poses even less risk.
If you have any questions about any of these procedures please feel free to contact our office at 902-742-7726 or email us [email protected] and we would be happy to discuss this further with you.
As of January 4, 2021, we implemented the following additional procedures to protect the firm and our clients from potential Cybersecurity issues.
Did you know that since the start of the pandemic, hackers have increased their attacks by a record 40% in 2020? Small businesses are among the largest victims. As such, Conrad Cushing Bain Inc. has listed the most common hacking methods below so that you understand the seriousness of the matter, as well as how we as a company are addressing them to ensure our policies are as current and safe as possible.
No. 01 – Access point
The no.1 hacker access point is through e-mail. Because of the rising incidences of hacking, CCB has implemented even more cybersecurity features to protect client and firm data. As a result, we can only accept and send files using our ShareFile encryption software. As a client of CCB, you can use this software for your interactions with us without cost. To access this software, please contact someone in our firm who will e-mail you an Upload link that you can use to attach your files. Otherwise, if you send unencrypted files, our staff will send you a link and ask you to send the files again using the encryption software.
Please give us a call if you have any trouble using the software. We are dedicated to ensuring that we have taken all available steps to protect your data and appreciate your efforts and patience.
No. 02 – Password selection
Consider strengthening all passwords to have a combination that would withstand current hacking procedures. If your password contains a word that can be found in a dictionary, it takes less than 10 seconds to hack, even if there are further numbers and symbols. A password that contains over 7 characters, a number, a letter and a symbol takes over 900 years to hack. A password with 10 characters is even more secure.
As a client, we’d advise you to update all of your passwords so that they don’t include full words. Please use acronyms that are easier to remember as the first letter of each word of , a rhyme or a song lyric, with numbers included (inclusion of symbols adds even more security). Having an intricate, strong password is better than having different, less secure passwords for multiple things.
Example: HPB#2TCOS (Harry Potter Book #2 Chamber of Secrets)
No. 03 – Home network
Home networks pose risk to the office. Hackers can infiltrate your home network and gain access to computer. Access can be gained through any item that is connected to your WIFI. This includes NEST security cameras, ROOMBAs, routers, SMART tech items for lights and thermostats, nanny cams, etc. You should ensure that passwords for routers, WIFI and each SMART item added are strong.
No. 04 – Computer Updates
Microsoft and Apple roll out security updates all of the time. Because people get annoyed with them, the updates are not always done in a timely manner. This leaves computer equipment vulnerable to the newest forms of hacking. Updates are important and allow your computers and devices to be current in virus software.
No. 05 – WIFI access points
Another unsecured route that hackers can access your computer and device is through unsecured WIFI points. So that free WIFI at the café or the airport is dangerous, giving hackers potential access to your device while browsing.
No. 06 – USB Drop Attacks
Hackers are accessing large corporations by imprinting the company logo on USB drives, putting malicious software on it and then dropping it in parking lots outside of the building. Although chances are slim in our area, there is a risk that a USB will be brought in that has virus software on it from a computer or software downloaded it and put on the stick (i.e. picture software is commonly used).
As a safety measure we are asking clients that are bringing files in on USBs to ensure that the USBs aren’t used for other activities and if the USB was purchased by them. If it was purchased by them, the risk is lower, and if Clients have only used it for corporate backup files it poses even less risk.
If you have any questions about any of these procedures please feel free to contact our office at 902-742-7726 or email us [email protected] and we would be happy to discuss this further with you.