The NOCout Report 001: Cybersecurity

by Jon Lober | NOC Technology

Jon dishes up our 12 best tips to keep your data safe.


This week’s Noc Out Report is a flyby description of the basic elements of IT security for your business. In tree minutes, Jon covers a 12-course meal of savory IT security tips. These top twelve security methods work together to provide robust protection against cybercriminals. Follow along to make sure that you are implementing all of them to keep your business safe at all angles. 


  1. Antivirus Software: Use advanced antivirus software to keep desktop computers, laptops, servers, and other devices protected from malware. 
  2. Email security: Good email security software works as a personal digital bouncer to keep shady emails out of your inbox. 
  3. Web security: Implement software that will stop you navigating to dangerous sites. 
  4. Password: Follow some of our recommendations to keep your data safe. 
  5. Two-factor Authentication (2FA): Also known as multi-factor authentication (MFA), this simple software sends you a push, notification, text, or email to make sure it is really you signing into that account. This is one of the easiest and most effective ways to keep your business safe. 
  6. Physical security: Often overlooked in digital security, make sure that you keep your important tech safely stored behind secure, locked doors. 
  7. Permissions: Be selective about who has access to secure portions of your network. Keep permissions up to date as your staff turns over. 
  8. Centralize Your Data: Whether in the cloud or private server, make sure you keep it all in a secure location. 
  9. Encryption: This basic step can make sure that you, and only you, can use any information that you store on your network. 
  10. Keep your tech updated: Updates provide critical patches to security vulnerabilities. Always take a few minutes to update your devices and software. 
  11. Staff Training: As new social engineering technique and sneaky technologies emerge, you need to keep you staff informed of how to spot and report suspicious activity. 
  12. Backups: Use this digital time machine to travel back to any point in your data’s history and recover what may have been lost. 

 


CEO and tech expert Jon Lober explains what is CMMC
By Jon Lober February 18, 2025
Cybersecurity compliance for handling CUI is evolving in 2025. In this episode of Tech Therapy, Jon covers both what is CUI and what is CMMC, and what does it matter to US manufacturers.
NOC Technology provides award-winning IT support for our neighbors in Pacific, MO
By Jon Lober February 18, 2025
Pacific, MO deserves better IT.
Tech therapy brings real listening and tech advice to business leaders.
By Jon Lober February 11, 2025
If you've followed us on The NOCout Report, you know we've spent some time digging into tech trends, cybersecurity best practices, and ways businesses can leverage IT to thrive. But as we step into 2025, we're making a pivot—one that’s all about diving deeper into the real challenges that you as a business owner or leader face. Tech therapy brings real conversations about the technology that is keeping you up at night.
More Articles
Share by: