business? here now are five ways to protect yourself from some common forms of fraud and cyber crime, courtesy of the u.s. small business administration. one, separate your personal banking from your business accounts. that way fraudsters can t get their hands on all your money. reporting deductions on your tax returns will also be easier. two, use a dedicated computer for banking. make sure it s one that isn t used for any other online activity, like social media, web surfing, these machines can be susceptible for vulnerabilities. three, have a password policy. make sure you and your employees change them regularly. also, set rules that passwords use different ones for online and system accounts. four, do background checks on potential employees. the first step to prevent fraudulent employee behavior is to make the right hiring decisions.
companies. so how secure is your business? here now are five ways to protect yourself from some common forms of fraud in cyber crime courtesy of the u.s. small business administration. one, separate your personal banking from your business accounts. that way fraudsters can t get their hands-on all your money. reporting deductions on your tax returns will also be easier. two, use a dedicated computer for banking. make sure it s one not used for any other online activity, like social media, web surfing. these tasks can make machines more susceptibles to vul neshlts. have a password policy. make sure you change them rgly. also, set rules that passwords are complex and use different passwords for different online and system accounts. four, do background checks on potential employees. the first step to prevent fraudulent employee behavior is to make the right hiring
companies so how secure is your business? here now are five ways to protect yourself from some common forms of fraud in cybercrime courtesy of the u.s. small business administration. one, separate your personal banking from your business accounts. that way, fraudsters can t get their hands on all your money. reporting deductions on your tax returns will also be easier. two, use a dedicated computer for banking. make sure it s one that isn t used for any other online activity like social media, e-mail and web surfing. these tasks can make machines for susceptible to vulnerability. three, have a password policy. make sure you and your employees change them regularly. also, set rules that passwords are complex and use different passwords for different online and system accounts. four, do background checks on potential employees. the first step to prevent fraudulent employee behavior to make the right hiring decisions.
prove? that there is so much information leakage out there people don t understand what they are putting out there. you keep commenting on your kids is a perfect example. so if you comment on your kids maybe your kids have something to do with the password policy. perfect example is when sarah palin s e-mail was hacked, you can go and look up this information and answer the security questions to say maybe a person s bank account or their e-mail. then gain more sensitive information and dig deeper. brian: a good, i guess, object lesson for those of us just using social media, that the information you put out there can be used against you. but will it change policy at the pentagon do you think? i think it will change policy, it will probably help provide a guideline. my company is working on a policy to share with everyone.