Ways of improving cyber security quickly and easily
If you are a small or micro business, there is an increasing chance that you will experience a cyber security breach. The National Cyber Security Centre (NCSC) estimates a 1 in 2 chance of experiencing a cyber-attack resulting in potential losses of over £1500.
This guide will provide you with information that is easy to understand and costs little to implement and doing so will significantly your protection from the most common types of cyber-crime.
It is based on the NSCS Cyber Security Small Business Guide and covers 5 topics that will show you how easy it can be to protect your organisation’s data, assets, and reputation.
To further help you, Acumenology has produced a series of Business Guides on a range of relevant topics. You can find these at: www.acumenology.co.uk/business-guides
Data is critical for the operation of any business and thus it is essential that all businesses irrespective of size regular backup their data and that it can easily be restored.
Doing so has the additional advantage that you can’t be blackmailed by ransomware attacks.
4 things to consider when backing up your data.
Ensure your backups run daily. This applies to both the data you backup on an external drive and, the backup carried out via your cloud service provider.
Most solutions allow you to do this automatically and using automated backups not only saves time, but also ensures that you have the latest version of your files should you need them.
You can also find out more on the ICO website Cloud computing.
Malicious software (‘malware’) is software or web content that can harm your organisation’s IT services. The most well-known form of malware is viruses, which are self-copying programs that infect software.
Consider these 5 tips that can help protect you from malware attacks.
You are reduce your risk by:
Blocking access to physical ports for most users
Using antivirus tools
Only allowing approved devices to be used
Ensuring files are transferred by email or cloud transfer such as MultCloud, Google Drive, One Drive or WeTransfer
Switch on your firewall
Firewalls create a ‘buffer zone’ between your own network and external networks (such as the Internet).
Most popular operating systems now include a firewall, so it may simply be a case of switching this on.
Businesses now commonly use mobile technology as part of their everyday business and with these devices being as powerful as computers it is important to ensure they are protected.
Here are 5 tips to keep your mobile devices secure.
Do not connect to unknown Wi-Fi Hotspots
Public Wi-Fi hotspots can be accessed by third parties to:
Access your work whilst connected
Access your login details to apps and web services whilst you are logged on
The safest method is to use your mobile 4G network, which has built-in security. You can also use ‘tethering’ (where your other devices such as laptops share your 4G connection).
You can also use Virtual Private Networks (VPNs), which encrypts your data but make sure you only use VPNs provided by reputable service providers.
For more information CLICK HERE
Your devices contain a lot of business-critical data, as well personal information and details of online accounts.
Using passwords correctly is a easy and effective way to prevent unauthorised access to your devices.
4 things to keep in mind when using passwords.
2FA requires two different methods of authentication before you can use the service. Generally, a password plus one other method.
This could be a code that’s sent to your smartphone (or a code that’s generated from a bank’s card reader).
A good rule is ‘make sure that somebody who knows you well, couldn’t guess your password in 20 attempts’.
Manage ‘password overload’
Do not be overzealous with passwords. Only enforce password access to a service if you really need to.
Where you do use passwords do not enforce regular password changes.
Passwords really only need to be changed when you suspect a compromise of the login credentials.
Use password managers. These are tools that can create and store passwords and which can be accessed via a ‘master password’.
For more information on setting up passwords read the NCSC’s password policy guidance.
A phishing attack involves scammers sending fake emails to thousands of people, asking for sensitive information (such as bank details), or containing links to bad websites.
Phishing emails are getting increasingly sophisticated and harder to spot. Whatever your business, it is likely you will receive phishing attacks at some point.
Here are some tips to help you identify the most common phishing attacks.