The risk of being a victim of a cyberattack is higher now than it's ever been. The cause of a breach is still the same though:
If you're reading this at work, take a look around the office, what do you think would most likely lead to a breach? Your servers? Possible. No Firewalls? Definitely worth fixing. A not-so-tech-savvy coworker whose password is also the name of their dog? Alarm bells should be ringing!
You can have your IT systems locked down like Fort Knox, if someone knows the password, it's all moot.
So what should your employees be doing differently? In this blog, we'll be looking at the best possible cybersecurity practices for you, and your coworkers.
How secure is your password? Seriously, take a look!
We touched on this in the introduction, passwords aren't something to set once and forgotten about! The best practice is to change passwords once per month, which sounds like a hassle, but luckily, password managers exist, like LastPass, which give very strong passwords for all your accounts, so you only need to remember and manage one password.
Passwords should never relate to something you can discover on your public Facebook pages, which means the names of your pets, children, anniversaries, birthdays or a celebrity you're a superfan of aren't good ideas.
If you can't tell who the email is from, don't open it! This isn't always the easiest thing to follow, oftentimes, someone will be trying to impersonate someone at your company to try and gain some information from you. Never open attachments from untrusted emails.
Another common type of scam email is something that claims to be something like LinkedIn asking for you to log on when in reality, it's a spoof login page. These are called "Phishing" scams and they are the most common techniques cybercriminals use.
Learning what constitutes a fishy email isn't the most intuitive thing to do, and, they can come in many, many forms. The best way to ensure everyone is on the same page is to arrange a user awareness session with a cybersecurity professional. Luckily, we offer just that! [Learn More]. This brings us to our next point:
Get your employees well trained, in sync, and consistently exercising best practices. All it takes is one slip up from an improperly trained employee to cause an entire business to crumble, think that's an exaggeration? 60% of SME's that fall victim to a cyber attack close their doors after 6 months!
Consultations with BTT cost you nothing, so discover how we can help!
Avoid the "Secure Enough" mentality
The only time a device is "secure enough" is if it's offline and physically inaccessible to others. Big multinational companies invest millions upon millions into cybersecurity, but they're still affected by cyber attacks. There just isn't a specific "point" when your cybersecurity reaches an acceptable level and can be no longer thought about.
Lewis Hamilton in the world's best car can't get from A to B with his eyes closed, even though he has world-class skills with the best possible tools, he still needs to think about what he's doing.
Employ a Hacker
You read that right, no one knows whether your system is secure better than someone who's tried to break into it, these are often called "Ethical Hackers" or "White hat Hackers
How “mobile” is your business?
Company Mobiles for staff – yay or nay?
5G: The future of mobile connectivity
Guide to Business Mobiles for your Small Business
Guide to choosing business mobiles for your recruiters
Guide to Choosing Business Mobiles for your Care Home
Get in touch!
We offer FREE advice for your future connectivity options.