You may have protected your business against disasters such as fire, flood, vandalism and theft, but how sure are you that you are protected against User error?
Can you trust that your employees are vigilant before opening any documents received via email or clicking those links without thinking? You can never be totally safe, but the risk of doing nothing could be huge.
Stockport based Amshire share their experience of User Error and offer some sound advice.
Recently one of our Customers was infected with the new variant of Ransomware. An employee had received an email with an attachment and opened it. In less than 40 minutes they had 60,000 files that had been encrypted which resulted in no access to files!!
Luckily for them, they had implemented a Disaster Recovery Solution which resulted in complete recovery of all the files with very little downtime.
Are you prepared to let someone steal your data? Take a look at Amshire’s Cybersecurity tips and keep your files safe.
10 Cybersecurity Tips for you and your business
- Train employees – establish security practices and policies for employees and create a culture which takes cybersecurity seriously.
- Protect your systems – install latest software updates to protect against the latest online threats. Carry out inside-out and outside-in penetration testing.
- Provide firewall security – ensure this is correctly configured. If employees work from home, ensure their home system(s) are also protected.
- Don’t forget mobile devices – make sure laptops, tablets and smartphones all have adequate safeguards and reporting procedures in place if lost or stolen.
- Backup – check all critical data is regularly (preferably automatically) backed up to a secure off-site location.
- Control physical access – secure building entry points, consider CCTV installation, ensure visitors are properly managed and IT areas locked.
- Secure your Wi-Fi – if you have a Wi-Fi network for your workplace, make sure it is secure and encrypted. Do not allow visitors to use – provide a secure, separate guest network if you want to offer this facility.
- Payment cards – if you take card payments, make sure validation and anti-fraud systems are in place and that you are fully PCI compliant. Don’t use the same computer to process payments and surf the Internet.
- Restrict employee rights – staff should only be given access to systems they need for their jobs and should not be able to install new software without permission.
- Password policy – require employees to use unique passwords which are changed at pre-set times. Consider implementing multi-level access authentication to highly sensitive systems.
Thank you to Amshire for sharing this article