search.noResults

search.searching

dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
IT


STAYING SAFE ONL I ENSTAYING SAFE ONLINE R


Phil Davies , commercial manager at Border Merchant Systems has some advice for merchants about cyber security, warning that a lack of basic online security measures could pave the way for serious cyber attacks.


e cent cyber-attacks highlighted again


that even the biggest organisations, including


the NHS in 2018, with huge IT budgets are vulnerable to malicious attacks.


Any type of security disruption could have severe implications f or your business. Although no one can ever guarantee complete safety, there are a number of practical precautions that are worth thinking about.


Speak to your supplier If you have a good working relationship with a reputable IT and comms supplier, then you can probably stop reading this article now. They are the best placed to advise you on maintaining IT security for your particular business. They will have the knowledge and the skill set to make sure that everything reasonable is being done to


keep the technology side of your business secure.


Password security The simplest and most effective precaution you can take. Many cyber-attacks succeed because of weak password protocols. Access to all equipment, wireless networks and data should be guarded with unique user names and passwords assigned to specific individuals.


D o some research on what makes a strong password. (Hint – it doesn’t include then name of your pet or your children’s birthday!)


If you have a master document containing all user passcodes, be sure to encrypt it with its own passcode and store it in a secure p lace.


When someone leaves the business make sure that you remove their access from your system completely.


Up to date anti-virus It’s worth having anti-virus


software installed on your servers and every PC on the network. Your IT supplier can recommend a good anti-virus system. (They don’t cost the earth.) Anti-virus software needs to be kept up to date to guard against new viruses and security threats.


Install updates


Windows updates are made available for a reason. Have a protocol in the business to make sure you install and apply windows updates as they become available. Don’t rely on individual staff members to download apply updates on their individual PCs.


Backups


Ensure that you have regular backups of your data and that information is stored securely.


( Ideally off site.) Do an exercise of testing your restore procedure.


Safe Systems


Reduce your exposure to hackers and thieves by limiting access to your technology infrastructure. Minimize points of failure by eliminating unnecessary access t o hardware and software, and restricting individual users’ access rights to only required equipment and software.


Staff Training


Lots of security breaches occur as a result of human error or carelessness. Help build a culture in the business that emphasizes IT security through training that warns of the risks of poor password practices and the careless use of networks, programs and devices. All security measures, from basic document- disposal procedures to protocols for handling lost passwords, should be well known to all staff in the business.


Staff security


The majority of unauthorized intrusions occur from inside network firewalls. Screen all new employees and check their references. If they are on an initial probationary period, make sure their access to sensitive data is either prohibited or limited. (Your IT supplier can advise you on the


Merchant software that delivers instant results Our staff have found Trader really easy to learn.


After just a week of using it, we are already seeing that it is going to make a massive difference to our business. Anthony Wroe, director, Pertonstore.com


www.mamtrader.co.uk 01226 352901


best method of tracking your employees network activity and locking out internet access to non-business related websites.)


Avoid the unknown Never click on unsolicited email attachments, which can contain viruses, Trojan programs or


computer worms. Before opening them, contact the sender to confirm message contents. If you’re unfamiliar with the source, it’s always best to err on t he side of caution by deleting the message, then potentially blocking the sender’s account and warning others to do the same.


Think before clicking Phishing scams operate by


sending innocent-looking emails from apparently trusted sources asking for usernames, passwords or personal information. Some scam artists even create fake Web sites that encourage potential victims into inputting the data themselves. Always go directly to a company’s known Internet address or pick up the phone before providing such info or clicking on suspicious links.


Review regularly


Shred documents with business names, addresses and other information, including the logos of suppliers, customers and


banks you deal with. Never leave sensitive information out on your desk for any sustained period of time. Change passwords regularly. It may seem a nuisance, but a little paranoia can go a long way. BM J


NEW


SUPPLIER CA ALOGUE


CATALOGUE


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52