At National Real Tax Tracking, we handle sensitive data at all times that relate to our financial services. If our data falls into the wrong hands during a ransomware attack, our liability goes out the window. With the multiple attacks across the globe of hackers taking hold of corporations’ files, we’ve decided to put together a few of the best practices to help protect your tech from would-be thieves.
Maintain Device Backups:
Your hard-drive contains countless files that are vital to your business continuity. It only makes sense to be sure they’re safely and securely saved somewhere (or even multiple places) in case you lose your data. For smaller businesses, consider using a web-based backup system such as SharePoint, Google Drive, or other cloud-based systems. But if you’re not willing to store your backups on a third-party cloud, consider building a private version with extra password security. If your hard-drive gets hacked or wiped, you’ll still have all your data protected and maintain company compliance.
NRTT hosts all of our databases on Microsoft Azure, which is SSAE 16, SOC3, and SAS 70-compliant.


Data Encryption:
It’s been asked: what is data encryption? Your data is private with details and information that are sensitive to your clients, your employees, and your business. When protecting yourself from ransomware, be sure to encrypt your data. Data encryption changes the language/code into a “secret formula” that only your password and security can decipher. Consider buying an encryption program to help lock down your data. If you’re using Windows, try the disk encryption tool Microsoft BitLocker. If your company uses Apple, Apple FileVault also provides encryption for all devices running on Mac OS X.
Educate Employees & IT Staff:
When it comes to e-security, a master Contingency Plan can be a saving grace. But if your team is trained on what to avoid and what to do while online, you may never need to implement your stored backups should the worst occur. Hold training sessions with your employees on how to identify scam emails, saving and storing passwords, and best practices with their own computers. NRTT employees are trained and re-trained on multiple levels of cyber security and how to identify potential threats. NRTT clients are given multi-level, secure login information for their use of NRTT products. All it takes is one Malicious Code from a scam email or downloaded file to put your business in jeopardy.


Keep Software Up-To-Date:
Software and technology are constantly evolving. With the latest updates come new security measures as tech companies learn more and more about how to protect their devices from hackers and malware. But hackers and scammers are also getting smarter. Programs that aren’t regularly updated lack newer security measures and are more susceptible to cyber threats.
