fbpx Skip to main content

The IRS Recommends the “Security Six” Steps to Protect Clients’ Data

By March 22, 2021Security
IRS recommends Security Six Steps

Does your organization handle sensitive financial information for clients?

If so, you’re probably required to create and maintain a security plan to protect client data, per the Financial Services Modernization Act of 1999 (also known as the Gramm-Leach-Bliley Act).

Where do you get started with securing taxpayer information though? The IRS recommends the “Security Six” steps:

  1. Install anti-virus software.
  2. Install a firewall.
  3. Turn on two-factor authentication.
  4. Use backup software or services.
  5. Use drive encryption software.
  6. Establish a virtual private network (VPN).

These six steps are crucial to securing data and protecting devices.

If you’re looking for security options to meet these recommendations and other compliance requirements, OXEN Technology has you covered. We can recommend endpoint detection & response, a security operation center service, and managed IT services for constant monitoring, maintenance, and security vigilance. We have decades of experience with the best next-generation firewalls and backup solutions.

And if you need advice on how to implement features like two-factor authentication (or MFA), VPNs, and encryption, our IT leadership experts can help you!

Today’s cybersecurity isn’t a one-time project. It’s an ongoing process of analysis, research, and improvement, which goes beyond just technology. We’re here to help you navigate it.

Contact us to schedule a time to discuss your options with a member of OXEN’s team!


Disaster Recovery

Importance of a Reliable Disaster Recovery Plan for Your Business

| Email, Managed Services, Security | No Comments
Running a business is not always a smooth-sailing operation. There are often things that could go wrong regardless of how cautious you are or how hard you abide by the so-called rules. Because of this, you should have a good backup and disaster recovery plan in case a disaster happens, like an accident or a cyberattack. There are plenty of BDR solutions for different businesses. You must find the one that fits your needs and will protect your network and data in the best way possible. Understanding Backup Disaster Recovery All businesses deal with important information, like details about transactions,…
Social Media Phishing

Quiz Time: Can You Handle Social Media Phishing Attacks at work?

| Managed Services, Security | No Comments
Our last three blogs have discussed cybersecurity threats and how they affect a business. We have talked about the dangers that stem from various types of malware. We have warned you about the newest cybersecurity risks expected to wreak havoc on businesses soon. And in the face of the ongoing growing acceptance of remote work setups, we have delved into the threats related to working from home. Now, we will now talk about social media phishing. The common thing in all these topics is that they are all linked to phishing. A strong phishing attack can make a network open…
Risks of Working from Home

Addressing the Cybersecurity Risks of Working from Home

| Business Productivity, Managed Services, Security, Tech Tip | No Comments
A remote workforce has become the norm since the pandemic. Even now that we consider it safe to return to office work, many businesses have maintained the remote work setup because of the advantages. However, the risks of working from home also bring issues that need attention so as not to risk the company’s network and data. What Are the Cybersecurity Risks That Come with Working from Home? There are risks when working from home. Workers lack the usual protective measures used in an office network. Many workers use their home networks and may also use the same device for…