4 Ways a CEO May Be Inviting a Cyber Criminal to AttackPut these digital security tips into practice to safeguard your company's files.

ByEric Basu

Opinions expressed by Entrepreneur contributors are their own.

In today's day and age, CEOs have their hands full, trying to ensure the safety of their businesses against cyber predators. With all of that energy and emphasis put intocyber securitythreats, it can be easy to overlook the smaller things that could be putting them and ultimately their company at risk.

Many of you may be taking risks without even knowing it. Here are four such examples:

Related:Why Security Should Be Top of Mind When Creating a Business

1. Too much Facebook birthday sharing.

In January,The Next Web reportedthat Facebook had 1.23 billion active monthly members, 757 million daily users and 945 million mobile users. The platform is the perfect gold mine for a cyber predator to access any information that would put you at risk.

To be more specific, your public Facebook account that discloses your complete name and date of birth could provide a cyber predator the tools to potentially obtain a Social Security number among other essential information to successfully infiltrate your business and personal accounts.

Related:The Risks of Business Travel in a Wired World (Infographic)

2. Wi-Fi vulnerabilities.

Imagine yourself away at a conference or business hotel where Wi-Fi is always available. Now, you, who had just been working online on your IPhone, IPad or laptop, have to catch a meeting. As you travel to the location, your device may as well, jumping from one connection to the next, as the settings are set to search and connect to each available network in range.

The risk manifests from this concept. Eventually your device, which contains crucial business information, may come across a shadow network, a system that is intended to look like any other public network except that it's monitored by a cyber predator. As your device connects automatically or you by mistake connect to this network, you unintentionally expose to a predator the business information that the device contained, giving him or her the opportunity to make a quick profit, without a high risk, at your company's expense.

Related:How to Create a Super Strong Password (Infographic)

3. Password perils.

Most people use passwords that are familiar to them and keep them in an easy to find place (often a piece of paper in their notebook or an unencrypted file on their computer or phone). This makes it easy for hackers to guess or steal their passwords.

There are many programs that will keep all of your passwords in one place in an encrypted format, and will generate new, random passwords for you. To avoid a hacker gaining access to your password-keeping program, however, be sure to use a password that you remember and don't write down anywhere, and that you change regularly.

This way you only have to remember one password. In addition, if your email program or other software programs allow it, always use dual-factor authentication. Dual-factor authentication means that in addition to entering your password you need to enter a one-use code that is sent to you in real time via your phone or sometimes, a token that you carry with you. This means that even if someone gets your password he or she still need one more piece of information to gain access to your information.

Related:Our Collective Mobile Security Blind Spot

4. Subverting smartphones.

The Washington Postreported in December that a year earlier, the FBI used a specially designed type of malicious software to gather information about a man named Mo, who had made a series of threats to detonate a series of bombs across the United States. The software would come as a link via email and had the ability to download files, emails and activate the device's camera as well as transmit all of the captured information if the recipient clicks the link.

方便,人们获得智能手机that have cameras, GPS and Wi-Fi could potentially used against them. Imagine if everything that you did was available to someone who wanted to harm you. Even if you have never broken the law or done anything unethical, the information that could be gathered could be use to steal your assets or besmirch your reputation.

So what should you do, when it seems like there can literally be a problem at every turn where you least expect? Just as you wash your hands before handling food, practice good cyber hygiene with these tips:.

a. On your Facebook account, remove the complete date of birth from public display.

b. Change the settings on an iPhone, IPad or laptop to wait for the authorization before connecting to a network or even turn off the Wi-Fi when it is not in use.

c. Use a complex password on every device you have that contains any information that completeliy identifies you as you or that could be used against you.

d. Keep your passwords safe in an encrypted password keeper.

e. Use dual-factor authentication for passwords.

f. To avoid malicious software, don't hit on any electronic link from an unknown source. A simple click can put your whole company at serious risk.

Related:The Internet of Things: New Threats Emerge in a Connected World

Wavy Line
Eric Basu

CEO of Sentek Global

Eric Basu is the CEO ofSentek Global, a provider of government and commercial cybersecurity and information technology solutions.

Editor's Pick

Related Topics

Business News

An 81-Year-Old Florida CEO Just Indicted for a $250 Million Ponzi Scheme Ran a Sprawling Senior Citizen Crime Ring

Carl Ruderman is the fifth senior citizen in the Miami-Fort-Lauderdale-Palm Beach metropolitan area to face charges in connection with the scam.

Business News

'Soul Crushing': Internet Sleuths Notice Something Is Very Off With This Condo Listing

From the grey carpets to the fluorescent lights, it's obvious that this home was not always a home.

Business News

'Awful Advice': Barbara Corcoran Slammed For 'Tone Deaf' Business Advice to Interns

The "Shark Tank" star shared tips on social media about how interns can increase their chances of getting hired full-time, but the public reaction didn't go as planned.

Growing a Business

Borekas Founder Uzi Wizman on Creating a Food Business from Social Media

Interview with Uzi Wizman, founder of Borekas and PSY Street Kitchen, about growing a brand from an Instagram Story and sharing culture with the world.

领导

6 Ways to Become a Better Listener

Listening is one of the most foundational and critical skills in building relationships at home and at work. It's not always easy to listen well, but with practice, we can all improve our skills. Here's six ways you can start.