Business | Top Tips
3.
For a start, the platforms themselves are eminently hackable but, also, it’s easy for you as a company, let alone your staff, to underestimate how much content you are sharing across X/Twitter, Facebook, Instagram, LinkedIn etc. This knowledge can be used by cybercriminals to build a profi le of your business which can help them break into your systems and wreak havoc. The general advice from experts is to keep your digital footprint as small as possible. Clear, detailed guidance that tells staff what they can and can’t post will help to minimise accidental leaks - for example, when a staff member shares something about a new customer on LinkedIn - and make you less vulnerable.
4. 5.
DEFINE THE RULES
The best way to ensure this doesn’t happen is to audit the software you are using, get rid of the packages you no longer need, are outdated or are known to be particularly hackable, share the results of that audit with staff and stipulate that no one can download anything onto their laptops or company smartphone without getting approval from the IT department or some other designated individual (such as a fi nance director). And as you conduct this exercise, do bear in mind that cyberattacks really can come from anywhere: one of the most successful and serious - on retailer Target back in 2014 - was made through its supplier of air conditioning services.
6.
BE WARY OF SOCIAL MEDIA
7.
BE PREPARED FOR A CRISIS
Cybersecurity breaches are inevitable, but it’s how a business deals with them that stops a drama becoming a crisis. It is a good idea to select a crisis manager who is not responsible for every aspect of a cyber recovery but, if the attack is extremely serious, can help your organisation make the key decisions, agree what resources are required and decide on a recovery strategy, whether you choose like-for-like (where, applying the principle of zero trust, you detect, clean and recover your existing systems), hybrid (where you use cloud-native tools to bring some elements, e.g. email, back within minutes, while the rest of the system is recovered) or public cloud (developing a cloud landing where systems are hosted in an Infrastructure-as-a-Service (IaaS) environment.
Quality, speed and value. With no compromise.
Acuity Prime printers feature a multi-award winning design that delivers a unique combination of quality, productivity and ease of use. With industrial build quality and up to seven ink channels plus primer, you can produce a wide range of superb, saleable print at higher speeds than machines costing much more. And now, the new larger bed Acuity Prime L boosts productivity and profits even further, offering even more value.
Discover the new blueprint for wide format.
www.imagereportsmag.co.uk | 2
ONCE MORE UNTO THE BREACH!
Some cybersecurity failures may seem trivial but they still need to be managed effi ciently and effectively. One of the basic human instincts is to try to rectify a mistake, rather than report it to someone in charge. If, for example, an employee sends a quote (containing confi dential information) to the wrong customer (very easily done when staff are busy and multitasking), their fi rst act will probably be to try and recall the email and, if that doesn’t work, contact the recipient, explain, and ask them to delete it. This is alright as far as it goes but isn’t as comprehensive or secure as alerting IT who can notify both customers of the incident, reassure them about the action taken, make absolutely sure the email is deleted and take a view on whether the contents which were shared wrongly infringed data protection rules. In cases like these, make sure staff recognise their fi rst task is to let IT know.
AND THEN THERE’S RANSOMWARE
Various studies suggest that one in four British SMEs were subjected to a ransomware attack in 2023. That sounds a little high but there is no doubt that gangs like attacking smaller companies with relatively unsophisticated defences because breaking into their systems to control or corrupt them until the ransom is paid. One partial remedy is to take out insurance but there are also
day-to-day things you can do to reduce the risk. Some of these actions (regularly scanning for viruses, investing in your fi rewall, training staff,fi ltering spam out of emails) sound exceptionally obvious, but they still need to be done. You could also back up your data regularly and store it somewhere offl ine, limit the administrative privileges given to employees and switch to two- factor authentication so that attackers can’t access your data purely through one compromised password. This will improve your cybersecurity in general as IBM has identifi ed that stealing someone’s credentials is the most common cause of data breaches worldwide.
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28