Do It Yourself Cybersecurity.

Here’s 5 things to get you started

1. Stop clicking on everything!

Clicking is fun, but do you even bank with CBA?

Most attacks require user interaction to succeed.
What’s the easiest way to infiltrate a business network? Get someone else to do it for you. What does that mean exactly? It would be hard for you to walk into an office and sit down at someone else’s computer then start doing “bad things” like stealing data or making bank transfers. Someone would surely see you and you’d be caught very easily.
Key points:

2. Keep your software up to date

Don’t leave your door unlocked

Software is never perfect and sooner or later a weakness will be identified.

Security issues are regularly identified in various parts of Windows, Mac, phones and apps – and updates are released on a regular basis.

These updates are needed even if you run antivirus and security software.

Key point:

  • Don’t make it easy for an attacker! Update software as soon as you can (and don’t forget to reboot afterwards!)

3. Use stronger passwords.

Don’t use the same password twice!

That’s a tough one – use a unique password per account! The reason why that’s important though is simple: if a website you use gets compromised, your super-duper password is now known to be associated with your username (normally your email address). A hacker will then use that username/password combination to log into as many services as possible.

If you have the same username/password combination for all of your online accounts, then all of your accounts will be compromised very easily.

Key points:

  • Use unique passwords per account
  • Use two-factor authentication (such as a token) for your computer and online systems
  • Use a password manager to handle your many, many passwords

4. Understand your Backup strategy

Don’t assume it’s being done!

We took over the support of a large organisation who had a man-in-a-van visit their office each day to pickup their latest backup tape. Whilst it’s an antiquated method of getting backups offsite, it’s not an unusual practice.

The problem was that the tapes being picked up each day were completely blank. If that company had suffered a fire (highly likely as they are a chemical manufacturer!) then they would have lost their entire trading history.

Follow the 3-2-1 backup approach as your absolute first step.

3 – copies of your data (live data and 2 backups)

2 – store your copies on at least 2 different storage types (i.e. disk, cloud, tape)

1 – store one of these copies offsite (cloud/tape)

Key points:

  • 3-2-1 backup approach as a minimum
  • request backup reports
  • test your backups on a monthly basis

5. Safeguard your tech

The bare minimum

Tech safeguards, such as Antivirus (now known as Endpoint Protection) are the bare minimum for any computer network. Just don’t be lulled into a false sense of security that this tech is going to make you 100% secure.

The minimum technology safeguards are:

  • Endpoint protection (antivirus and anti-malware)
  • Email link protection
  • Email filtering
  • Firewalls
  • Web filtering
  • Two Factor Authentication (2FA)

Key points:

  • Implement the minimum tech safeguards
  • Consider using a password manager
  • Don’t assume you’re 100% safe!

FULLY MANAGED IT SERVICES.

Rock IT is your trusted partner for Managed IT Infrastructure and End-User Support Services. Rock IT is more than just an IT Support company though – we offer the flexibility of on-site and remote support, plus Cyber security expertise included in our offering.

Whatever you need, our dedicated team becomes a true extension of your business.

ROCK SOLID IT
since 2003.