Net Platforms

Defending Your Business

In the previous article we explored cyber security, its importance in modern business, and how essential it is that it takes it’s place at the very forefront of your business concerns. We also looked at some of the methods used by cyber criminals to attack your systems and gain access or control over your vital business data.

In the following article we will investigate some cyber security fundamentals that will equip and prepare you and your team in the eventuality of a strategically planned cyber attack.

 

The Cyber Security Fundamentals

Good data backup

Cyber attacks are a common occurrence in today’s world. This makes it essential you have sufficient backup in the event of an attack. You must have a strategy in place which ensures that your IT systems, and your essential data, are safeguarded to the best possible standard. Your business relies on them entirely – if anything happens to them your entire company may fail entirely.

We whole heartedly recommend a way to ensure cyber security – it’s called the 3-2-1 backup rule, and ensures that there are always three copies of your data; two of which should be on your choice of separate storage media, and one should be stored offsite in the eventuality of a disaster. Having three copies of data gives you 0two fail safes in case they are needed, allowing you to rest easy knowing your business could still operate after a disaster. operate effectively should a disaster occur.

Guaranteeing cyber security 100%, unfortunately, isn’t possible because new methods of attack are being developed all the time so it is all about how you manage those risks. Having data backups are the top tool on the market to achieve as close to cyber security and business continuity as possible – the number one goal is to be able to continue working no matter the circumstances. Data backup gives you the opportunity to make guarantees to your customers that were previously not possible.

 

Secure passwords

We all know the importance of passwords. By now it is apparent that we shouldn’t use common number or letter sequences, words or phrases that mean something to you, or repeatedly use the same password across multiple accounts. Good passwords are random – the letters, numbers, and other characters have no meaning to you and are not in any sort of sequence – this makes them hard to remember but that is the idea; the more difficult the better.

Your team needs to follow a strict set of rules when creating their passwords. Following the rules will enable passwords to stand up against the cyber criminals trying to breach them.

  • Use multi-factor authentication where it is available.

 

  • If it is too easy to remember – then don’t use it. Avoid easily recalled sequential passwords, recurring numbers (such as 1234, 6789) as well as frequently used words.

 

  • If possible, make sure your password is over 10 characters long and contains a combination of letters, numbers and even special characters – when it comes to passwords the longer the better!

 

  • Use upper and lower-case letters.

 

  • Periodically change your password; sometimes accounts are hacked unbeknownst to the account holder, so it makes sense regardless of suspicious activity to change it now and again.

Passwords are the first – and arguably the most important – line of defence in your arsenal. It is understandable why users often think about the ease of their own experience rather than the security of the system and instead make their passwords as easy as possible to remember and input – after all, work is hard enough as it is without adding to work processes. But, data must be safeguarded – yes, it is tedious, but passwords are a necessity – not a choice.

 

Manage permissions

Managing permissions to your system is another key cyber security measure. A user should only have permission to access accounts that mirror their station. Data loss, theft or – if the cyber criminals are particularly clever – deliberate changes to your security settings could facilitate future – more devastating – attacks. Having permissions means only those that need access have it, lessening the likelihood of an accidental facilitation of an attack.

 

Anti-Malware measures

Anti-Malware software MUST always be downloaded on your laptops and computers – that goes for all devices not just business ones. It is good how a lot of operating systems often come with a free version – which is okay at best, but under no circumstances will it be good enough for business use, so replace it with quality rated software as soon as possible.

 

Data encryption

People think that theft is the sole aim of a cyber criminal, but, in actual fact, it is to encrypt your data. Here comes the confusing part – you need to get there first. Encrypting your own data sounds counterproductive but it is literally a case of who does it first – you must hold the keys to your system, and it must stay that way. If you get there first you are the gatekeeper of your system, and you decide who enters.

 

Education

Your team are the first line of defence in your organisation, and they are by far the most important one too. Most attackers target them due to their usual ignorance when it comes to cyber security, therefore it is essential they are equipped with the knowledge to know not only what to look out for but also how to use the various security tools in the right way.

 

Implement an IT Security Policy

It is essential that you have an IT Security policy. The policies you decide to implement in your organisation need to be clear to understand for both yourself and your team, and they need to be known and signed by your entire team regardless of their level of dependence on IT. Doing so will make your organisation more secure before you’ve even implemented any new technologies, because if everyone knows what their role is in the pursuit of a cyber secure workplace then that is arguably even more valuable than any tools you can buy.

The policies must be well thought out and should clearly outline the security guidelines and obligations of the team both when working in a remote or on-premise setting. The policies will give you peace of mind that your team not only know how to conduct themselves in the most secure way possible, but also that they know how important their role is in the safety of the organisation.  Whether they consistently do this is another thing, but once they have written their signature next to the procedure you can rest easy knowing they have read and understood what is required of them, meaning that you are within your right to take action if they don’t behave as they promised to.

If all this seems too difficult, please don’t hesitate to get in contact with our team for expert IT consultancy.

 

 

Cyber Security and your organisation

Using the tools at your disposal in your 365 ecosystem correctly will ensure value. You have the power to revolutionise the way your organisation produces work. We can ensure that you implement the right tools, use them correctly, and plan for the future with those tools as important assets in the prolonged success and safety of your organisation. Our success can be attributed to one thing: TRUST. Ever since our very first year in business our clients have been happy to recommend us to other businesses, and we have grown steadily as a result of these recommendations. We can help you to truly get the best from your IT in the most secure way possible. Don’t hesitate – contact us now!

Defending Your Business

________________________________________________________________________________________________________________

Book a no-obligation discovery call with a member of our team today by calling 0207 993 9035 or hello@netplatforms.wmtemp.com