Please configure

Data security blind spots

Fingerprint on keyboard

For insights, opinions and advice to inspire you and your team on your digital journey, you can subscribe to our newsletter. Subscribe now

Modern hackers are sophisticated and strategic.

They search for holes in your IT system. If they access sensitive data, they can target you or your customers. Hackers can cause havoc to your business by holding you ransom, selling your information and more.

Here are some common data security blind spots to check.

1. Not securing network printers

Network printers are insecure by default. Most printers allow full access unless an administrator configures the device otherwise. If hackers can get into your printer, then your entire network could be compromised. A Quocirca Business & Analysis Survey found that 61% of US companies reported at least one printer-related data breach in 2016. Download the survey

2. Ignoring security patches

Hackers are always changing and evolving their techniques. So every time your computer prompts you to do an update, accept it. Remember, your first defence against hackers is your operating system.

3. Not securing WiFi networks

Unsecured WiFi networks let hackers access email addresses and passwords. You could be a target, especially if you deal with sensitive information, Hackers can get between your staff and guests and your network if you don't secure it.

One option for securing your WiFi network is using a Virtual Private Network (VPN). A VPN uses encryption to create a virtual “tunnel” between your device and the server. A VPN will secure your WiFi network.

4. Leaving Bluetooth on

Hackers love Bluetooth. Leaving Bluetooth on is like opening a door for hackers. Two main types of Bluetooth hacking are bluesnarfing and bluebugging:

  • In bluesnarfing, hackers connect to your device via Bluetooth and access its data. Hackers download the data before the device goes out of range (up to 10 metres)
  • In bluebugging, hackers connect to your device and make calls, send text messages and access the internet. Hackers can also access personal information this way

To be safe, turn off your phone’s WiFi and Bluetooth when you're not using it. Also use two-factor authentication on your online accounts. Both of these actions provide effective solutions to keep out hackers.

5. Using fake sites and apps

Fake sites and apps often look exactly like the original, but with a different spelling or logo. If you enter your email address or credit card information on a fake website, you could be at risk. Protect yourself by knowing how to spot some of these warning signs.

First, look at the URL. Make sure the address starts with https. The ‘s’ stands for ‘secure’ and indicates that the website uses encryption to transfer data. So any data you enter into forms is protected from hackers. Fake sites also mimic well-recognised brands or organisations. One example is Yah00.com with zeroes instead of o's. So always check the domain name, especially if you're typing it into the address bar.

If you're entering financial information, look for logos like DigiCert, Verisign or Symantec. A fake site may use these logos on their sites, so click on the logo to see if it loads details about the website’s security. If the logo is a picture with no link, the site is likely fake.

Keep in touch with Spark Lab

Running a business is easier when you can tap into a network of friends and mentors. At Spark Lab you’ll be part of a business community providing inspiration, advice and support. No matter how big or small your business, join us for access to some of NZ's most successful business minds.

Join the Facebook community for NZ business

Please configure