Ahead of a cyber security webinar being hosted later this month, IT experts from technology company Sharp explain how antivirus software is only one weapon in your business’ arsenal when defending from cyber security threats.
Many businesses fail to prioritise cyber security, or set weak protections like simple standalone antivirus software. Though this does offer some defence against malicious cyber criminals, as technology becomes more advanced, so too do the threats.
According to the government’s Cyber Security Breaches Survey 2021, cyber-attacks have become more frequent, with four in ten businesses and over a quarter of charities having reported a breach or attack in the last 12 months. And it not just small organisations that should take note – two-thirds of reported attacks came from medium and large businesses. Simply, this means a multi-layered approach should be taken to protect your business critical data.
What’s wrong with Antivirus?
Nothing at all. Antivirus is brilliant at protecting our devices and data against known threats. The problem arises as technology advances and newer threats develop. These attacks would be unknown to antivirus software and would not be stopped.
It’s not just a case of not clicking suspicious links or visiting dodgy sites either, highly sophisticated, seemingly safe tools can be used to bypass antivirus protection without detection. Criminals can use these tools to place malicious content onto legitimate sites, which would bypass antivirus protection without anybody realising and make businesses vulnerable.
What can you do?
Talk to your IT department or IT support provider about implementing a multi-layered Cyber Security approach. A mix of solutions and support are needed, but one of the most important first steps is educating your team. With the second biggest cause of data breaches being human error, be sure to give your team regular training to empower them with the knowledge needed to help spot criminal activity.
Use free educational resources:
Things to consider:
- Physical access: locked rooms and restricted areas.
- Network and equipment like local area network switches, routers, firewalls, wireless, intrusion prevention systems, remote access servers, protocols, network operating systems (OS) and wide area networks.
- Servers: OS, applications and databases.
- Endpoint devices and user management.
- Data protection: Two Factor Authentication (2FA) for password protection.
- Disaster Recovery Planning for business continuity should hackers hold your data at ransom.
- People: security polices, business conduct guidelines and local regulations.
Still not sure on the steps you should take? Our IT division is hosting a free-to-join Cyber Security webinar, where you can ask questions and find out more – here. We look forward to speaking with you!