Cyber security tips

Cyber Security Tip 1: Remember, It Could Happen To You!

The first and most important of our cyber security tips is to never assume you won’t be a target. Smaller companies will often have the mindset that their data isn’t important enough to be hacked. Small-to-medium businesses are attractive victims to hackers, as they typically won’t have the same level of defenses as larger companies.

If your company has money or data, it has a bullseye on it just as large as any other company. This data includes passwords, client information, sensitive email threads, etc. Thinking it’ll never happen to me makes you complacent and likely to drop your guard. Always assume you are a target, and that the internet trolls are out to get you. Take the time to know and understand your assets (where a breach is most likely to occur). You can even perform threat-modelling exercises and put practical protection measures in place.

Cyber Security Tip 2: Practice Good Password Management

Strong, lengthy, random passwords with various character types, including upper and lowercase letters, drastically reduce the likelihood of your password being guessed. Refrain from using the same password for multiple sites and accounts, even if it’s a complex password. Also refrain from ever sharing your password with anyone, including a family member or close friend. Consider using a password management system, like LastPass. This password manager should be used in lieu of writing complex passwords on a post-it note or in your notepad.

Also use two-factor authentication (2FA) wherever possible, especially on internet-facing systems. 2FA can do wonders for your business’s cyber security. Even if a hacker has a password, they won’t obtain access to an account as a second level of identification is required. Ensure your employees follow the same protocols. The IT team ― internal or external ― should set up the password manager and 2FA on staff desktops and any other devices they use for work, including BYOD (bring your own device). This will ensure that, even if an employee has a weak or reused password, it won’t jeopardise company data. Periodically updating your passwords, at least every six months, is also a necessary measure to take to practice good password measurement.

Cyber Security Tip 3: Practice Sensible Internet Browsing (AKA Don’t Click the Dodgy Links!)

Be aware of safe sites and links, learn to recognise phishing attempts in emails (basically never click the link!), and ensure your employees practice safe browsing, too. Simple things like don’t share your password online should be reiterated. Employers and employee’s should be suspicious of potential malware at all times, as opposed to only considering the presence of malware when there are obvious signs.

Always remember to be careful what you click. Harmful links may appear via email, as pop-ups, or as unexpected attachments. Never let your employees freely download software onto their work computer. This could lead to downloading software from untrusted sources that host malware, compromising the device without anyone realising it’s happening.

Cyber Security Tip 4: Enable System Access Only As Required

You should regularly evaluate system access and ensure staff only have access to the data or networks required for their job. Wherever there is staff turnover, ensure their access is removed and be sure to require two-factor authentication for said access. Mobile application management will ensure that previous employees will not be able to access company data and accounts on their BYOD after they have left the business.

A good rule to follow is to only allow staff the minimum amount of access they need, never the maximum. Also don’t allow for blanket access across teams or departments, unless every member needs it to do their job. Make sure that you restrict administrative privileges, just giving them to the minimum amount of people you need to. User accounts with these privileges are attractive targets for cybercrime, as they hold a high level of system access. Minimising privileges makes it more difficult for an adversary to spread or hide their existence.

Cyber Security Tip 5: Be Wary of External Devices

With a culture of BYOD becoming more prevalent, be sure you’re screening all devices before they connect to your network. Laptops, mobiles, and USB flash drives can all carry malware and infect your system. Consider mobile device management or mobile application management to ensure your employees can only access company data on secure networks. This will also allow company apps and data to be remotely wiped if the device is compromised.

This is true for company-owned devices, too. Corporate mobile devices, whether it be a laptop, mobile, or tablet, contain locally-saved sensitive data and are connected to the company’s internal network through VPNs and workspace browsers. This can give the attacker to obtain direct access to the business if security measures are not in place. Think of mobile devices as an extension of the network perimeter, but easier to lose or steal. 

Cyber Security Tip 6: Back It Up

Back up all your networks and systems at regular intervals, whether it’s to a cloud-based server, or a physical one. This should be standard practice anyway, but ensure your incident response plan includes it, too, in case things go awry. You should always store the backup data separate from the main server.

If there is a cyber attack, you might have to completely wipe a device or server. This is particularly seen in ransomware cases, which are on the rise. If you store backups offline and in multiple locations, infected systems won’t be able to access it. If a breach occurred, regularly perform tests to ensure that an infected system cannot access to your data. Also make sure you regularly test that backups are being done correctly and that your data restoration procedures are effective.

Cyber Security Tip 7:  Ensure All Systems are Patched and Up To Date

Always keep your systems securely figured and updated. Device and software manufacturers release software patches to correct flaws in the software’s previous version, which includes cyber security vulnerabilities. Under the same premises, installing the latest software updates is equally as important and as easy to do. Leaving your system on older versions increases your likelihood of being exploited for weaknesses.

Insecurely configured environments let your system become an easy target for malicious activity, as it’s easier to obtain unauthorised access. Installing the latest patches and updates on your devices is an important habit to get into. You can do this through scheduling update checks, turning on automatic updates, and using web browsers (such as Chrome) that receive frequent, automatic security updates.

Cyber Security Tip 8: Monitor and Test your Networks

By constantly monitoring and testing your networks and devices, you’ll be the first to notice any suspicious activity. If something seems out of the ordinary, it could be a sign that the system has been compromised. Be involved and understand how activity should normally look so you immediately notice red flags pertaining to potential attacks. You should think about how putting a Security Operations Centre (SOC) to act as ‘virtual security guards’ can help effectively prevent, detect, and respond to a malicious attack.

You should also make sure that penetration tests and vulnerability assessments are conducted. They’ll detect any infrastructure weaknesses that could result in system vulnerabilities. If you have SOC in place, these results can be used to determine your detection and response capabilities.

Cyber Security Tip 9: Use Technology and Education to Defend Against Malware

Preventative measures are, of course, the best way to stop a cyber attack from happening altogether. They can save your company a lot of time and money! Aim for your business to have defenses that make it harder for a malware attack to infiltrate your system. Measures should also be in place so that an attack can get isolated. This means if one computer gets infected the malware is blocked from spreading.

There are a range of precautions that can be taken ― email security, firewalls, and ad- and script-blockers can block malicious senders and attachments. A firewall is a software- or hardware-based application that will prevent malicious attacks from various types of malware, such as hackers, worms, ransomware, and viruses that try to steal information. A crucial way of defending against malware is to educate and train your employees. That way, the initial downloading and execution of ransomware, malware, and phishing links will be prevented. In our cyber security services, Stanfield IT offer staff training so they are confident in their own cyber security knowledge and the preventative measures to take.

Cyber Security Tip 10: Follow The Essential Eight

ACSC’s Essential Eight strategies are recommended by the Attorney General’s Department. Implementing the strategies relevant to your company is a great step to mitigate cyber threats. Other frameworks and strategies are also effective, which we delve into in our blog covering The 7 Most Common IT Security Framework Options in Australia.

Of these, The Essential Eight are the most practical starting point for businesses to improve their cyber resilience. They comprise of eight mitigation strategies that act as a baseline of protection against cyber security threats. These eight strategies cover: application whitelisting, patching applications, configuring macro settings, user application hardening, restricting administrative privileges, patching operating systems, multi-factor authentication, and daily backups. The Essential Eight are designed so that they’re customisable to your business’s risk profile and the adversaries that are of the most threat to your business.

#cybersecurity #hacking #security #technology #hacker #infosec #tech #ethicalhacking #programming #linux #hackers #cyber #kalilinux #cybercrime #malware #python #privacy #it #iot #cyberattack #coding #dataprotection #hack #ethicalhacker #networking #informationsecurity #cybersecurityawareness #programmer #datasecurity #itsecurity #informationtechnology #software #business #cloud #computerscience #computer #internet #cloudcomputing #network #windows #bhfyp #data #phishing #hacked #cybersecuritytraining #coder #ai #artificialintelligence #cisco #anonymous #code #ransomware #encryption #networksecurity #java #digital #training #bigdata #machinelearning

OP: StanfieldIT

2 views0 comments