Small Business Security Checklist

Introduction

Avoid unknown USB drives

  • A USB device can mimic an actual keyboard and execute commands like stealing files or installing malwares.
  • It can pretend to be a network card and alter the domain name system of the targeted computer; this lets the hacker type any URL to a website of their choice and secretly redirect traffic.

Avoid Free USB Charging Ports

Avoid Unsecured WiFi/Data

--

--

I help companies build and maintain a better web presence through Information Architecture, Project Management & Web Strategy.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Joshua Maddux

I help companies build and maintain a better web presence through Information Architecture, Project Management & Web Strategy.