FEATURE
BUSINESS CRIME & PROTECTION
Protect your business against cyber crime
Many small and medium-sized business owners operate under the belief that they are too small to be a victim of cyber crime – then find out too late that this belief is completely incorrect. While it’s true that an SME might not have as much to
steal as a large, national or global company, they also often tend to have less secure networks, as cyber security isn’t seen as a priority, making it much easier for cyber criminals to attack. A lack of time or a worry about the cost are often the reasons cited for why a firm’s cyber security efforts aren’t up to scratch. But there are many ways to protect your businesses and avoid being a victim of cyber crime without breaking the bank.
USE A FIREWALL One of your first lines of defence against a cyber-attack should be a firewall, as it sets up a barrier between your data and cyber criminals. Don’t just focus on your work computers – make sure you install a firewall on all company laptops and home networks if any of your staff work from home.
ANTI-MALWARE SOFTWARE Alongside a firewall, install anti-malware software. It’s easy to assume your employees would never interact with a phishing email or open a suspicious file. However, cyber criminals are getting more sophisticated and it is becoming increasingly difficult to tell the difference between a genuine email and a dangerous one.
PASSWORDS Data breaches aren’t always the cause of someone inadvertently clicking a dangerous link – weak or stolen passwords can also result in a significant loss of data. As well as making sure that all devices and networks are password protected, get your staff into the habit of changing their passwords regularly. The most secure passwords contain a range of upper and lowercase letters, numbers and symbols.
36 business network June/July 2020
MULTI FACTOR AUTHENTICATION Multi factor Authentication (MFA) is a security practice that verifies identity by requiring multiple credentials. For example, rather than just asking for a username and password, MFA will also ask for additional verification, such as a timed response to an email, a code sent to the account holder’s phone, the answer to a security question, a fingerprint, or facial recognition. MFA is a simple tool that adds an extra layer of protection – while a cyber thief might have cracked an employee’s password, it’s extremely unlikely they will also have access to their email account, phone or fingerprints. Best of all, most email accounts, smartphones and networks already have a built-in MFA setting. All you need to do is activate it.
BACK UP DATA While it’s important to prevent attacks, never assume your efforts will work 100% of the time. With this in mind, it’s important to back up all your data regularly, in case malware completely wipes your network. Backups should either be stored in a separate location, in case of physical theft, fire or flood, or on the cloud. It’s also worth noting that you should check your backup regularly, to ensure it’s functioning correctly.
POLICY AND EDUCATION It’s essential that all employees who access your networks are trained in cyber security best practices. Cybercrime is, unfortunately, constantly evolving, so it’s important that you and your staff stay up to date with the different types of cyber crime and how you can all help protect the business. It would also be prudent to draw up cyber security
policies and make sure all staff are aware of what is expected from them to help deter cyber threats, and the correct protocols to follow should your business fall victim to cyber crime.
‘Don’t just focus on your work computers – make sure you install a firewall on all company laptops and home networks’
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68 |
Page 69 |
Page 70 |
Page 71 |
Page 72