3 minute read

Protect your business from cyberattack HOW TO...

within the UK, as well as organisations outside the UK that offer goods or services to individuals in the UK. One area of cybersecurity that’s often overlooked is physical security, so keep your devices locked up when not in use, just as you do with diagnostic equipment and tools. Also, make sure all physical network connections, such as your wifi router, access points and network connections, are inaccessible to casual visitors.

Repelling hackers

Cybersecurity is vital for protecting your business from online threats such as theft, extortion and damage, and hackers may try to gain access to personal information or sensitive data to cause harm to your business. Of course, if your business is large and complex, you should seek expert advice, but there are a number of relatively simple things you can do right now to keep the hackers out:

1. Keep regular backups of critical business data.

2. Ensure all software is up to date.

3. Implement a password policy.

4. Put procedures in place to protect you from fraud.

5. Only connect devices to secure networks.

However, recent research shows that only half of all businesses do all five of these tasks, with around a third connecting to unsecured wifi.

The criminals’ toolkit

A cyberattack is when a hacker tries to disable systems, steal data or destroy information by gaining unauthorised access to a computer system. The European Union Agency for Cybersecurity list four common cyberattacks on small-to-mediumsized businesses:

1. Phishing – Fraudulent emails asking businesses to share passwords and information.

2. Malware – Software (a virus) designed to get unauthorised access and cause damage.

3. Malicious Insiders – Employees or former employees who have access to your system.

4.Denial-of-Service – An attack trying to overload company systems.

Having a good policy and strong defences in place will stop almost all of these cyberattacks. However, the technology and methods used to carry them out develops quickly, so it’s important to keep all procedures and defences up to date.

Are your defences up to the task?

Whatever your level of cybersecurity, it’s always worth auditing your systems, so how many areas of this checklist can you tick off? Most are easy to implement and will significantly reduce the possibility of a cyberattack.

Identify which data you need to back up

Keep your backup separate from your computer

Consider using cloud storage

Regular process

Install antivirus software

Block unknown apps

Keep all IT equipment up to date

Control how USB drives and memory cards can be used

Switch on a firewall

Equipment

Password protection

Stolen devices

Keep your software up to date

Don’t connect to unknown wifi hotspots

Passwords

Switch on password protection

Use two-factor authentication (2FA)

Don’t use predictable passwords

Help staff cope with ‘password overload’

Change default passwords

Reduce the impact of a successful attack

Think about how you work

Check for obvious signs of phishing

Make sure all attacks are reported

Information that your business couldn’t function without Access to data backups should be restricted so they are inaccessible to staff and not permanently connected

A service provider stores your data on their infrastructure so it’s physically separate from your location

Make running a backup part of your daily business schedule

Check the software is switched on Prevent staff from downloading them

Check all software and firmware are the latest versions

One device containing malware could devastate your business

This creates a buffer between your network and the internet

Notes

Use a suitably complex PIN or password on all equipment

Ensure that any lost or stolen devices can be tracked, locked or wiped

This includes operating systems as well as apps

There’s no way to easily find out who controls them

Notes

Use a screen lock password, PIN or other method such as fingerprint or face recognition

It adds a lot of security for not much effort

They should be easy to remember but hard to guess

Don’t enforce regular password changes. Passwords only need to be changed if you suspect they are compromised

A common error is keeping the default usernames and passwords that devices are issued with

Notes

Configure staff accounts to the lowest level of user rights required for their roles. If they fall victim to a phishing attack, potential damage is reduced

How could someone target your business? Ensure your staff understand best working practice

Many frauds originate overseas and standards of spelling, grammar, punctuation and graphics are often poor

Encourage your staff to ask for help if they think they may have been a victim of phishing

This article is from: