Latest Cyber Security Threats and Top Tips

LATEST CYBER SECURITY THREATS PUSH BUSINESSES OF EVERY SIZE TO BE ULTRA-VIGILANT ONLINE

People have been spending more time online due to remote working and businesses being forced to close due to COVID-19. On the opposite side of the spectrum, cybercriminals and threats have increased significantly as well. And they will continue to exploit the pandemic over the next weeks and months. From outdated software versions, stolen passwords, application vulnerabilities, malware, and phishing scams, these all have been many of the reasons behind the abundance of data breaches in the past. However, according to a recent report by Willis Towers Watson, there are new threats to be concerned about. These including scams, malware distribution, domain name registration, or rapidly deployed attacks relating to COVID-19 or coronavirus.

The frequency of security breaches has increased by over two-thirds since 2014. And yet even with the heightened risk of attacks, businesses continue to fail when it comes to taking precautions. Businesses of all sizes have been crippled by ransomware attacks, completely losing control of their data. But small businesses have a bigger risk because of the availability of information cyber criminals are after. Most of the time smaller businesses lack the security capabilities of larger businesses.

High Risks Associated with Remote Working

COVID-19 related shutdowns made remote workforces necessary, and businesses have had to address remote access issues. Virtual private networks (VPNs) and multifactor authentication methods have benefited companies. But other businesses that aren’t tech-savvy have left themselves open to attacks.

In a virtual working environment, clients and employees are using mobile devices far more. So, attacks via phone (“vishing”) and via application or text message (“smishing”) have increased as well. The way it works is, SMS attacks will redirect recipients to a website that is vulnerable in order to take control of their device. That way they can harvest their credentials (usernames, passwords, etc.).

One particularly troubling statistic is that 88% of small business owners felt that their company was vulnerable to attacks. And this was before the COVID-19 pandemic even began. The challenge lies in that many companies aren’t able to afford professional IT solutions, lack the time and energy that cybersecurity requires, or don’t even know where they should start.

Your Company offers your location businesses the following advice to protect their data from being breached and to improve their cybersecurity.

Top Tips to Protect Your Business from Cyber Security Threats

Make sure staff is trained and able to identify cyber security threats.

A potential hacker or phishing scammer will search for a point of entry into a company’s network system, targeting these vulnerabilities. Unfortunately, most of the public is unprepared, with a Computer Disposals study finding that only 5% of the public is able to detect and differentiate between genuine and phishing scam emails. Another important method to use is enforcing a company-wide password policy for employees. This makes it less likely for systems to fall risk to brute-force attacks because each character set or length of passwords increases the number of possibilities exponentially for a hacking program to break. For example, if using only letters and numbers, a 10-character password can still be instantly cracked. However, a 10-character password containing numbers, upper and lowercase letters, and symbols would take five years to crack. A 16-character password with the same character sets would take one trillion years to crack! Make sure every employee understands the importance and reasoning behind a longer, more complex password.

Make sure all applications have the latest version of software updated.

Potential hackers or organizations that attempt to gain access to a company’s systems and data often will try to break through programs, which is why security companies catch these threats and update programs on a consistent basis to remove those vulnerabilities, so make sure to routinely check and upgrade major software on all systems.

Have the most up-to-date antivirus and firewall technologies installed.

This goes without saying, but a system that has outdated firewalls or antivirus software that isn’t updated on a regular basis resembles a piece of fruit left exposed to the elements. Eventually, mold will take over the fruit and render it unfit for consumption, similar to a company’s data being compromised by hackers or cyber attackers.

If you would like to find out how we can help secure your business then get in touch with us.

Past Blogs

what is dmarc

What is DMARC

What is DMARC and Why Does Your Business Need It? When it comes to protecting your business from cyber threats, email security is often overlooked. Yet, email is one of...
Why is password management software important

Why is Password Management Software Important

Why is Password Management Software Important for Your Business? In today’s digital world, passwords are the keys to your business’s most sensitive information. From...
What is Email Filtering ?

What is Email Filtering and Why Every Business Needs It

Email is the lifeblood of business communication, but it’s also one of the most vulnerable entry points for cyberattacks. According to research, 96% of cyber threats...
What’s your business’s view on Return to Office?

What’s your business’s view on Return to Office?

Do you love keeping your employees happy by allowing them to work remotely? Or do you think everyone is more productive in the office? Businesses are divided on this...
Outdated backup systems could leave your business vulnerable

Outdated backup systems could leave your business vulnerable

When did you last review your business’s backup tools? Outdated backup systems can fail to protect you from modern threats, like ransomware attacks. If you want a...
Microsoft’s fixing this annoying Windows 11 fault

Microsoft’s fixing this annoying Windows 11 fault

Fed up seeing useless “Recommendations” in the Windows 11 Start menu? Good news – Microsoft’s making them more helpful. Here’s how the improvements could help your team...
Beware that corrupted email attachment: It could be a scam

Beware that corrupted email attachment: It could be a scam

Cyber criminals get more creative every day. The latest scam designed to steal your business data uses corrupted Word files – and getting fooled is easier than you...
Are your employees your security’s weakest link?

Are your employees your security’s weakest link?

Great employees have the same goals you do. But while they’re working hard to help your business succeed, they could accidentally be opening the door to cyber...
The two big threats of doing business on public Wi-Fi

The two big threats of doing business on public Wi-Fi

Public Wi-Fi can be a lifesaver when you must send an urgent email while out of the office. But did you know it can also put your business data at risk? These are the...
FOMO is driving businesses to spend more on IT 

FOMO is driving businesses to spend more on IT 

FOMO – the fear of missing out – can creep into many aspects of your life. This can include FOMO over business tech, which is driving many businesses to spend more. But...