Posted by & filed under Cloud Computing, IT Security, IT Support.

Computer-Virus-2

93% of companies who lose data for more than 10 days file for bankruptcy less than a year later.*

This could be the sobering reality you face if you don’t take responsible, proactive steps in order to defend your livelihood against hacking and other forms of cyber-crime.

Beyond putting the right technology in the right place, let’s look at how you can mitigate against…

Phishing Emails

Promising special offers or making false claims about bank statements or tax records, phishing emails typically tempt between 60 and 90% of employees to ‘click here’, which can have catastrophic consequences for your business.

Action you can take:

  • Teach your employees to be vigilant for bogus emails and not to click anything they do not fully trust – banks do not send emails asking people to verify login details!
  • Carry out regular phishing assessments or “cyber-attack drills” by regularly exposing your staff to various realistic attacks but in a controlled environment.
  • Have in place a process to report phishing emails and who to notify in case they’re clicked purposely or by error; ideally to be carried out within 15 minutes.

Data Thieves

Encrypting your data ensures that if someone were to get their hands on your computer, they wouldn’t be able to easily access your files or get hold of your personal data.

Action you can take:

  • On certain versions of Windows encryption is a pretty simple process and on other systems there is software available to enable this.
  • Ensure all of your files including documents, photos, music, bookmarks and anything else you may need are backed up and readily available in case you become “locked-out” and are no longer able to access them on your computer.

Password Hackers

Last year ‘123456’ headed up a list of the 25 most common passwords. Choosing a password like this is the IT equivalent of putting out a welcome mat and leaving your key in the front door. Strong passwords are at least 8 characters long (longer is better!) and contain a combination of numbers, symbols and letters.

Actions you can take:

  • Don’t use the company name or even the name of the program you are using (e.g. Photoshop123).
  • Don’t keep your carefully-chosen words the same for all accounts. Think of something memorable but with different variations for each, and store them away from your PC.

Network Infiltrators

Free Wi-Fi or other kinds of wireless or shared networks in places like coffee shops, hotels, conference rooms and on public transport can be used by anyone – making them the perfect hunting ground for hackers.

Actions you can take:

  • Read the Terms and Conditions of wireless networks before logging on.
  • Think ‘safety first’ and turn on all the security protection open to you.
  • Don’t login to sensitive sites (such as your online banking) when using a public wireless network

Virus Spreaders

‘Code Red’, ‘Slammer’, ‘MyDoom’… Viruses so infamous they’re classed as the most destructive of all time. Specific viruses come and go but the key to surviving them all is the same – be vigilant. Protect yourself and your assets.

Actions you can take:

  • Keep your internet security software up-to-date and switched on at all times.
  • Apply the latest Microsoft updates to your Windows operating system as soon as possible
  • Install and apply the latest manufacturers’ updates for all your software programs.
  • Trust your gut. If an attachment, email or website doesn’t feel safe, it most likely isn’t.

The PC Support Group provides expert advice on all matters relating to cybersecurity. Contact us on 03300 886 116 to discuss your IT strategy, and how we can bring our world-class managed service provider benefits to your organisation.

*Source: National Archives & Records Administration in Washington