NSN Management Blog

NSN Management has been serving the Tulsa and NE Oklahoma area since 2012, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Identifying Errors in Phishing Emails can Save Your Bacon

Identifying Errors in Phishing Emails can Save Your Bacon

Phishing scams have been around for a long time, and they have only grown more convincing and more dangerous. Some businesses can’t even tell the difference between phishing scams and legitimate messages! How can your organization take the fight to phishing emails? It all starts with knowing what to look out for.

0 Comments
Continue reading

Tip of the Week: Make Sure Your Headphones are Clean

Tip of the Week: Make Sure Your Headphones are Clean

With so many people working remotely, it’s no surprise that folks are used to having headsets on or earbuds in. With increased use, these devices naturally get dirtier than they would otherwise. Let’s take a look at how you might go about cleaning them.

0 Comments
Continue reading

Four (4) Tips for Protecting Personal Identifiable Information (PII)

Privacy is a hot-button topic, and alarming revelations about identity theft and data breaches seem to happen daily. As organizations battle to keep personally identifiable information (PII) safe and secure, it becomes more and more apparent that all employees have a role to play in protecting data privacy.

The important thing to remember is that PII is more than just social security numbers and credit card numbers. PII includes any piece of information that can be used individually or in combination to identify a specific person. One-to-one identifiers (e.g., license numbers, finger prints, and insurance policy numbers) can be tied to individuals, but one-to-many identifiers — data points like first names, job titles, city of residence, and last names — can be combined to achieve the same end. In fact, it’s estimated that 87% of the U.S. population can be identified using just three pieces of PII: gender, zip code, and birth date.

With that rather startling statistic in mind, it is clear that even seemingly small pieces of data can have value. If you come into contact with, collect, or store PII for coworkers or customers, here are four tips that can help keep PII safe:

1. Use appropriate security safeguards for PII

Clearly, some PII is more sensitive than others. A list of customer names and email addresses doesn’t need the same security protections as a list of customer names and credit card numbers. You would naturally want to keep the latter list very secure and only share that information on an as-needed basis. But that doesn’t mean the list of names and email addresses should be shared freely with anyone and everyone. It’s certainly not information you’d like to put in the hands of competitors, for example.

In order to gauge the level of sensitivity associated with PII, think about the ramifications in the event of a breach. The more sensitive the data, the more intense the protections should be.

2. Only collect PII you truly need

There are a number of reasons an organization might collect data from its customers: for mailing lists (email or snail mail), billing, shipping, etc. Sometimes, as in the case of medical offices, collecting information is simply the starting point of a service relationship.

But it’s important to think about the information you truly need to have and limit collection to business-critical items. For example, if you’re building a mailing list, think about whether you need anything beyond an email address. If you don’t do hard-copy mailings or calling campaigns, there’s no reason to collect mailing addresses and phone numbers.

Really think about the information you need before you ask for it.

3. Be smart about storing PII

Similar to the cautions associated with collecting PII, special considerations should be taken when storing PII. The more PII there is on an organization’s network, the more vulnerable that organization is in the event of a breach. So before you store it, consider if it’s business critical. If not, securely dispose of it. If so, apply the appropriate safeguards (including physical security measures for paper files and encryption and secure server storage for electronic files). In addition, be sure to revisit stored data and purge that which is out of date or no longer business critical.

4. Apply general security best practices to PII when appropriate

Keep common-sense best practices in mind when dealing with PII because they add an important layer of security. Password protecting secure systems is a must, as is keeping your passwords private. Do not let unauthorized individuals access secure areas or systems, and don’t be too quick to disclose personal data about yourself, your coworkers, or your customers over the phone or on social media.

At the end of the day, it’s about recognizing PII and keeping security and privacy top of mind as you use, collect, and store personal data. Also be sure to familiarize yourself with any corporate or industry policies that govern handling of PII.

If you have any questions on how to protect PII, give us a call at 918-770-7400. One of our team members will be be happy to walk you through options and answer your questions.

Continue reading

Best Practices are What Make Us Stand Out

Best Practices are What Make Us Stand Out

You hear the term “best practices” quite often, but unless you know what the buzzword means, it is pretty much meaningless. There actually is some merit to understanding what the term “best practice” is and why it is so important, so without further ado, let’s take a deeper dive into what a best practice actually is.

0 Comments
Continue reading

Don’t Let Your Small Business Fall Prey to These Common Security Risks

Don’t Let Your Small Business Fall Prey to These Common Security Risks

Data breaches are an unfortunate reality that businesses have to contend with, but small businesses often do not give them the consideration that they deserve. It is critical that you consider security challenges and take these risks seriously. Let’s examine how you can overcome some of the many challenges that small businesses have with cybersecurity.

0 Comments
Continue reading

3 Tips to Build Better Habits (Future You Will Thank You)

3 Tips to Build Better Habits (Future You Will Thank You)

Some high-profile business owners are notorious for having daily routines that build good habits, like going to the gym or waking up early, but more often than not, the stressors of day-to-day business build bad habits that compound on each other over time. Therefore, it is imperative that you address this now and develop good, productive habits.

0 Comments
Continue reading

Managing Your Email Can Help You Be More Productive

Managing Your Email Can Help You Be More Productive

Wrangling an email inbox that has been left to its own devices for months can be a challenge, especially for those who sign up for email lists and never unsubscribe from anything. If this sounds like you, be sure to read on and discover ways that you can finally take back control of your email inbox.

0 Comments
Continue reading

Considering Your Business’ Cybersecurity Strategy

Considering Your Business’ Cybersecurity Strategy

It should come as no surprise that cybersecurity is an important consideration for a business, which means it is important that you are aware of how effective your security practices are. Evaluating this is best accomplished by testing your team and their preparedness… but how often should you do so?

0 Comments
Continue reading

Colonial Pipeline Ransomware Response Raises Questions

Colonial Pipeline Ransomware Response Raises Questions

As is often the case with ransomware attacks, the situation with the Colonial Pipeline hack has grown more complex as more information regarding the attack has been discovered. Here are some of the major developments that you should keep top of mind in the wake of this devastating ransomware attack.

0 Comments
Continue reading

Explaining the Difference Between HIPAA and HITRUST

Explaining the Difference Between HIPAA and HITRUST

Some industries have specific standards that must be met regarding data security and privacy. For healthcare and its related industries, you have HIPAA, the Health Insurance Portability and Accountability Act, which protects the privacy of patient records and requires that organizations maintain them in a specific fashion. To make this a bit easier is HITRUST, the Health Information Trust Alliance. How are these two intertwined and how do they make the privacy regulations in the United States easier to understand?

0 Comments
Continue reading

Make Cybersecurity a Culture Within Your Organization

Make Cybersecurity a Culture Within Your Organization

Unfortunate as it might be, one single solution is not going to eliminate any and all of your cybersecurity woes. That said, there are plenty of ways that you can mitigate the majority of threats and minimize their chances of success. One of the best ways is to construct a culture of cybersecurity awareness within your organization that encompasses all employees, including upper-level management and the C-suite. Here are 11 ways that you can build up an enduring culture of cybersecurity awareness for your business.

0 Comments
Continue reading

A Company’s Cybersecurity Culture Starts from the Top

A Company’s Cybersecurity Culture Starts from the Top

There are countless aspects of running a business that demand your attention on a daily basis, but one of the most important that can often go by the wayside is cybersecurity. No matter the size of your business, cybersecurity can make all the difference in preserving your organization’s future. While we recommend implementing technology solutions to make cybersecurity easier to manage, without an established culture of cybersecurity, your business will remain at risk regardless of the measure you take to protect it.

0 Comments
Continue reading

Tip of the Week: Managing Turnover

Tip of the Week: Managing Turnover

A lot of people have wanted to do their jobs from home for a very long time. It took a global pandemic to make it happen, but over the past year, millions of people have successfully navigated remote work from the comfort of their homes. The reality of it was a lot different than what most of them expected, however. Some organizations are simply better at managing their remote workers and this, and other factors, have led to some significant turnover at some companies. Let’s take a look at the reasons for this and give you a couple of tips that will help you retain your remote workers.

0 Comments
Continue reading

Smart Technology Can Actually Help You to Streamline Your Business

Smart Technology Can Actually Help You to Streamline Your Business

A lot has been made about smart technology over the past few years with one major takeaway: it is far too risky to deploy. Security problems with Internet of Things (IoT) devices have been widely discussed and it has kept organizations from deploying technology that can really help their business. Let’s take a look at some of the technologies that your business can use to streamline your operations.

0 Comments
Continue reading

If Your Backup Doesn’t Involve These Three Aspects, You’re Doing It Wrong

If Your Backup Doesn’t Involve These Three Aspects, You’re Doing It Wrong

For any business continuity strategy to be complete, a data backup strategy needs to be involved. This is often easier said than done: there are a lot of elements that need to be considered, and some data can go overlooked if the solution isn’t maintained. However, considering the likelihood of data loss without one, a data backup is an indispensable component to prioritize and evaluate over time.

0 Comments
Continue reading

Tip of the Week: Properly Preparing to Respond to a Data Breach

Tip of the Week: Properly Preparing to Respond to a Data Breach

While nobody wants their company to suffer a data breach, the nature of today’s workplace makes these occurrences harder and harder to avoid. In fact, chances are that you’ll eventually encounter one, which makes it important to prepare to deal with it when it comes about.

Here, we’ve outlined a few steps to help your business weather the storm:

0 Comments
Continue reading

How to Prepare Your Team to Fight Phishing

How to Prepare Your Team to Fight Phishing

While last year saw a significant decrease in its number of data breaches, the number of records that were leaked doubled… and then some. Part of this can likely be attributed to a spike in the use of ransomware, indicating a resurgence in interest of the mean-spirited malware. This means that your business may very well see more ransomware infection attempts coming its way—the only question is, are your team members prepared for them?

0 Comments
Continue reading

The Lego Group Is Using IT the Right Way

The Lego Group Is Using IT the Right Way

Regardless of a business’ size, technology can help it to resolve most operational challenges it is contending with. For instance, global toy producer The Lego Group shared their own story about how improved IT solutions helped it to address some significant issues it had. Let’s go over what The Lego Group did, and then see how their process could translate to your business.

0 Comments
Continue reading

How To Keep Burnout From Impacting Your Productivity

How To Keep Burnout From Impacting Your Productivity

We’ve all had those days when motivation eludes us, and they can be extremely frustrating. Fortunately, there are ways that you can rejuvenate your drive in either your personal or professional life. Let’s go over some of these tactics to try and keep burnout at arm’s length.

0 Comments
Continue reading

Two Lessons Businesses Can Learn from the Spotify Data Discovery

Two Lessons Businesses Can Learn from the Spotify Data Discovery

Every so often, we come across a bit of news that helps to teach not one, but two cybersecurity best practices at the same time. With the recent news of a cache of hacked Spotify accounts, we find just such an opportunity. Let’s review the two lessons to be learned.

0 Comments
Continue reading

Latest Blog

Phishing scams have been around for a long time, and they have only grown more convincing and more dangerous. Some businesses can’t even tell the difference between phishing scams and legitimate messages! How can your organization take the ...

Contact Us

Learn more about what NSN Management
can do for your business.

NSN Management
12818 S. Memorial Dr. Unit 108
Bixby, Oklahoma 74008

Account Login