How is your Cyber Hygiene?

Cyber-Security,

Cyber Hygiene is becoming an increasingly important consideration in the fight against cyber crime.

What do the figures look like?

The statistics around Cyber Crime are astounding. According to research carried out by HMRC in 2017:

  • 46% of all companies suffered some kind of data breach in the year, which increased to 66% in larger businesses.
  • 13% of businesses reported that they are being attacked daily.
  • 72% of the reported attacks are from phishing or malicious emails, of which 33& are through the use of malware, and 27% are through impersonating the organisation under attack.

What could it mean to your business?

The results of an attack can be significant for any business:

  • Loss of reputation
  • Costs to clients or customers whose information may be compromised
  • Cost in terms of time and financial outlay to fix and resolve the problem.
  • With GDPR looming, there will be hefty fines in future.

So how can Cyber Hygiene help?

What should businesses be considering to protect themselves and the data they hold?

The most important consideration is setting up and maintaining consistent routines, with regular checks and behaviours to ensure our online health is conserved. In other words, our day to day routines keep us, and our data, as safe and possible!

What should you look at to ensure your Cyber Hygiene is good?

There are some very basic areas that you should look at to ensure that you are doing all that you can to ensure your security, though you may well need to call on your IT expert for their support and confirmation that some aspects are in place.

    1. Accesses

      • Check to see who has access to what systems. Only grant access that allows your team into areas they need to fulfil their roles.
      • Implement two stage authentication wherever possible. The large software providers have given this option for a very valid reason!
      • Remove old users accounts that may no longer be required.
      • Keep administration privileges to a minimum.
      • Remove any old PCs or connections as soon as they are no longer required and dispose of them safely.
      • Ensure your website is kept up to date with security updates as soon as they become available. The cost of a maintenance programme will far outweigh the cost of putting right a serious security breach.
    2. Passwords

      1. As standard, your passwords should be a minimum of 8 characters, including upper and lower case, special characters and numbers.
      2. Avoid words or names related to you that could be guessed.
      3. Misspelled words are great as they are extremely difficult to guess.
      4. Change your passwords regularly.
      5. Never use the same password for multiple systems or programmes.
      6. Never allow the sharing of passwords within your business.
    3. Malicious / Phishing Emails

      1. This is the most popular weapon of choice, so make sure your team knows what to look for.
      2. Fake invoice emails are the most popular.
      3. Make sure you conduct the following checks before you click on any attachments:
        1. Am I expecting the invoice?
        2. Does it look right? Is the spelling correct?
        3. If you hover over the sender name does it look right?
        4. Is the grammar and language used what you would expect?
      4. Try sending phishing emails to your own business and see what results you get.
    4. AntiVirus Software and Firewalls

      1. Speak to your IT support and make sure that these are 100% up to date and robust. They are your last line of defence.
      2. Scan your systems regularly and keep the software up to date for new viruses. The rate of development has accelerated dramatically recently and will continue to do so.
    5. Data Back-ups

      1. Again, ensure these are taken regularly.
      2. Make sure your back-ups can be restored quickly and efficiently to avoid the loss of data.
      3. Check how these are stored and that they are secure. A back-up of your data would be a gift to anyone who could obtain access!

Once you have been through all of the above, make sure that you have a programme in place to review and check that this stays up to date. Make sure that new colleagues are carefully trained, and that old habits don’t recur.

Finally, make sure that your IT support are keeping you informed of new developments and changing behaviours and risks around the area of Cyber Hygiene, Cyber Health and security. The easiest way to do this may be to send them a link to this post and ask them the question!