XU Magazine - Issue 12

Page 88

How to protect your payroll data from cyber-crime Cyber-criminals are attacking corporate networks with increased frequency. According to the 2017 Trustwave Global Security Report, the most commonly targeted victims are those with vulnerable software platforms. Most at risk are corporate and internal networks (43% of all attacks) and point-of-sale (POS) systems (31%)...

I

nsecure remote access software, unsuspecting employees and poor password policies are responsible for the majority of global security breaches that took place in 2016. It’s simply too easy for cyber-criminals to ‘break-in’. E-commerce providers, mostly due to pressure from banks, are working hard to tighten up their security measures. The results are encouraging; cyber-attacks targeting e-commerce platforms have dropped from 38% to 26%. However, as companies get smarter, so too do cyber-criminals. Upgraded firewalls and enforced security measures are all important, but determined hackers are devising new ways to gain access. Manipulative methods like phishing and social engineering are now responsible for 19% of all corporate security breaches. The success of these attacks depend on one very valuable currency: personal information. Once a cyber-criminal has accessed an employee’s salary breakdown or banking details, for example, they can use that information to manipulate their way into the corporate network. As phishing and social engineering attacks become increasingly sophisticated, it’s absolutely crucial that companies protect their payroll data to the best of their abilities.

88 / Issue 12

Here are three ways for companies to safeguard their payroll data: 1) Employee training All employees, regardless of their position in the company need regular cyber-security training. In the rush of day-to-day business, it’s all too easy for a clever phishing attack to catch someone – be it the CEO or the new intern – offguard. Armed with company payroll information, a cyber-criminal could phone or email an unsuspecting employee with a seemingly legitimate request from the payroll team. All it takes is a couple of seconds for the employee to unwittingly open a link or insert their network password and the system is breached. Unfortunately, ignorance is no defence in the event of security breach – and the company in question will typically have to face expensive legal consequences. However, the greatest cost is undoubtedly the damage done to a company’s reputation. Public loss of customer or employee information has a far-reaching business impact. To safeguard business revenues and growth potential, staff must be trained to spot and report suspicious phone calls or emails. 2) Password protocol

@PaySpace

Warren van Wyk is one of the founding members and leaders of PaySpace Warren has over 18 years of experience in the software development industry. After graduating from Van Zyl and Pritchard, he started his career at an international payroll vendor where he travelled internationally on many projects and gained huge insight and exposure to international payroll requirements. He later moved to a large software outsource services vendor where he was placed on a project to rewrite a large client’s entire software technology stack using Microsoft technologies. His vast end-to-end software project experience coupled with his technical payroll knowledge greatly assisted the PaySpace team in the architectural solution design, having a leading and managing hand in every intricate area. His role as a leader in PaySpace means that he performs a variety of tasks which significantly affect the growth and strategy of the company.

combination to get right but crucial in the fight against cyber-crime. Most individuals have many different passwords to remember. As the list lengthens, it’s only natural to choose something simple like a birthday or home address. Unfortunately, a dictionary attack can crack a basic code (even if letters are replaced by numbers) in just a couple of seconds. Part of employee cyber-security training needs to focus on password creation. A strong password is at least eight characters long and mixed up with upper and lowercase letters, symbols and numbers. Ideally, a password should be something that can’t be found in a dictionary. All corporate network passwords need to be run through a regular password check to make sure they’re as uncrackable as possible. As extra precaution, when an employee leaves, passwords need to be changed.

Passwords need to be tough, yet memorable. Not an easy

XU Magazine - the independent magazine for Xero users, by Xero users. Find us online at: xumagazine.com


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

TUTORIAL - How to: set up an

4min
pages 129-132

NEW RELEASES - Updates and

10min
pages 116-119

Boma’s self-drive marketing

4min
pages 114-115

The benefits of a custom Xero

3min
pages 110-111

How to protect your payroll

4min
pages 88-89

The future of B2B eCommerce

4min
pages 92-93

CASE STUDY - Save time

4min
pages 108-109

How to help clients choose

4min
pages 102-103

GDPR - The facts. The reality

6min
pages 90-91

CASE STUDY - Small

3min
pages 86-87

We’re a funny breed us

3min
pages 94-95

Becoming a successful

8min
pages 80-85

Both sides of the coin

10min
pages 76-79

Clouds and rainy days

4min
pages 68-69

Make every mile count

3min
pages 74-75

INTERVIEW - Konstantin

5min
pages 62-65

Everyone’s a cloud integrator

4min
pages 66-67

Customer support is the most

5min
pages 58-59

New online portal makes

5min
pages 72-73

ABC: Accountants

5min
pages 56-57

Investing in systems repays

5min
pages 42-43

Event - Accountex: two

4min
pages 54-55

Planning successful cloud

4min
pages 36-37

Meet Curve: Xero’s new card

5min
pages 38-39

International trade? It’s

5min
pages 40-41

Measuring recurring revenue

11min
pages 44-51

You’re wasting your time at

5min
pages 52-53

AppsForOps: Venter Consulting

0
pages 32-33

It’s not just you. The global

3min
pages 16-17

Globalization and mobilization

13min
pages 24-31

Bills to be paid vs

1min
page 5

COVER STORY - Outsourcing

6min
pages 13-15

Why consistency with Deputy

4min
pages 22-23

Vertical integration

5min
pages 8-12

INTERVIEW - Amy Harris, Futrli

6min
pages 18-21

Entering employee leave details

2min
page 4
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.