The car hauling industry has benefited tremendously from new technology and software solutions. Unfortunately, there’s no shortage of individuals looking to exploit these advances for personal gain. Today, locking up your online resources is just as essential as securing your fleet.
Luckily, there are simple steps you can take to make sure your electronic accounts, including on Super Dispatch, are secure. Here’s how…
Use Unique Passwords
Passwords should not contain words that can be found in a dictionary or personal information like your name and address. Instead, we strongly suggest creating a password with a minimum of 8 characters and using a combination of uppercase letters, lowercase letters, numbers, and special characters (for example: @, %, +).
Importantly, once you’ve concocted the perfect combination, avoid sharing your password with others. It’s unlikely that a disgruntled past or present employee would want to cause damage. But it’s not worth risking. Don’t make it easier for bad actors by giving them access to business assets.
Protect Against Suspicious Messages and Activity
If you receive an email from an unknown person or organization and suspect anything, first, make sure the email address and sender’s name match. If, after that you still have doubts, check with your email service provider to see if the email account in question is fake, and report any suspected spam or phishing attempts.
Finally, it’s good to get in the habit of regularly checking your email settings and reviewing your history to ensure there’s no unfamiliar activity that would signify a breach.
Use the Newest Version of the Software Available
Companies release software updates to provide users with more features and a better overall experience. Often, this includes additional security capabilities to fortify accounts. So, make sure you’re using the latest and greatest product versions — that goes for Super Dispatch and any other tools and applications, as well as web browsers and operating systems.
If you’re unsure whether you’re already using the most up-to-date version, you can uninstall and reinstall the software from the provider.
Use Security Settings and Permission Features
There are proven measures available to you that greatly enhance your security posture — we encourage you don’t ignore them. On your devices, use built-in security settings like two-factor authentication, lock screens, recovery codes, and any additional features it offers.
Furthermore, be sure to review your permission features — things like guest accounts, permission hierarchy, and your default permission group — not just for devices, but also for online programs, software, and digital databases. This way, you can prevent unauthorized access when others are logged-in to an account or using your device.
Next Steps
Cybersecurity improvements, along with the methods used by those trying to get around them, continue to change rapidly. For that reason, reviewing and updating cybersecurity practices and procedures feels daunting for many. But as this article demonstrates, it doesn’t take much to instantly enhance your security posture and better safeguard assets. Stay mindful of who you share your devices and information with — and be sure to take advantage of built-in security features that do a lot of the work for you. You do that, and you’ll be good shape.