Yawn, this topic has been done to death right? Well yes and no we think.
Cybercriminals are increasingly preying on small businesses, which often lack the expertise and resources to adequately protect themselves. In 2013, companies with one to 250 employees were the victims of more than 30% of all cyber-attacks, according to Symantec’s 2013 Internet Security Threat Report. That’s 3 times more than what was reported in 2011.
So yes, the risk is real but that’s no reason to turn your laptop off, go back to writing letters and making use of the post office or carrier pigeons.
There is a growing number of people around the world that can only be classified as “Dooms Day Preachers” they get petrified every time something pop’s up on their screen, followed by the “Help, I’ve been hacked” statement. They are also the group of people that have a recommended security app for everything, a preferred antivirus for all different tasks and a “Do’s and Dont’s” list that is probably longer than the code that makes up Facebook.
It’s pretty scary chatting to people like this and, it’s unnerving to think that some people that do listen to them think that it’s the gospel truth and end up spending fortunes on software that they do not actually need.
A simplified answer to counter the ever present dangers of Cybercriminals
The topic of online security has been done to death is this regard but, what hasn’t been covered is a simple list of the things any person or business owner needs. Things like:
Should I install antivirus software?
Installing antivirus software and keeping it updated is a must for business owner’s as Antivirus software detects and removes malware, including adware and spyware, and filters out potentially dangerous downloads and emails.
Using the Kaspersky Small Office Security Suite is an ideal way for small business to guard against attacks on personal computers, mobile devices, and file servers.
What do I do when I get suspicious emails from known and unknown senders?
Never open or reply to an email that seems suspicious, even if it appears to be from someone you know, its that simple. But should you find yourself in a situation where you have opened something that is suspicious, don’t click on any links or open any of the attachments. If you do, you could fall victim to email-borne financial and identity theft threats, including “phishing scams.”
Phishing are emails which appear to be from trustworthy sources, such as a bank or an online merchant you have done business with, they lure you into a false sense of security by giving the appearance of being legitimate and official and then attempt to acquire private data, including bank account and credit card numbers.
Should I use a firewall to protect my company’s internet connection?
Always use a firewall to protect your company’s inbound and outbound network traffic. A firewall can help prevent hackers from tapping into your network and to block access to certain websites. They can also be configured to bar employees from sending proprietary data and specific types of emails outside of your network.
How often should I back up essential company information?
Back up your business’s vital information on a regular basis using a combination of cloud and hard copy backups that are kept off site. Dropbox is a convenient and affordable means to back up to the cloud and for off-site backups the Verbatim media share wireless storage device is a seamless way of having up to 9 users back up at the same time.
How can I secure my Wi-Fi network?
Instead of using an older, less secure Wired Equivalent Privacy (WEP) network, use the Wi-Fi Protected Access version 2 (WPA2), which is widely considered the most current and secure encryption available.
To hide your Wi-Fi network, change the name of your wireless access point or router, also known as the Service Set Identifier (SSID). If you don’t, hackers could easily breach your network using the default SSID provided by the router’s manufacturer. For added protection, you can require users to enter a 25- to 64-character alphanumeric Pre-Shared Key (PSK) passphrase.
And as always should you need any further advise or assistance, please feel free to
contact us here or on any of our social media platforms below.