Unfortunately, it’s all too often that we read about how hackers have managed to breach a well-known company’s defences and got their hands on some highly sensitive information. This can happen to a company of any size, although it doesn’t quite make the headlines in the same way.  Just because you may be classified as an SME, doesn’t make your company immune to an attack of this kind. If you use computerised technology in the day to day running of your business, then you are vulnerable to the threat. 

 

The National: credit: Google Imagescredit: Google Images

 

If you haven’t already done so, your business should most definitely be looking into cyber security. Not only will it give you peace of mind, but it will help in maintaining your customers’ trust and confidence.  

 

There are some straightforward steps that you can put in place to safeguard your business and reassure your customer base that you are taking the necessary measures to protect their information. It’s worth remembering that out with your company’s reputation taking a hit should an attack happen, there can be also be legal consequences.  

 

Steps that can be taken: 

 

Install Security Software 

The National: credit: Google Imagescredit: Google Images

This goes without saying but having security software installed in all computers and laptops is vital. You should make sure that the software also includes anti-virus, anti-spy ware and anti-spam filters. Having a firewall set up to protect your internal network is also a must to prevent threats from entering.  

 

Secured Networks 

As working remotely is on the rise, it is more important than ever that your employees understand what they can use when they are on unsecured networks. For example, if they tend to use their local coffee shop, they should avoid browsing if the network is untrusted. It is recommended that only secured networks are used.  

 

Secure passwords 

The National: credit: Google Imagescredit: Google Images

 

A simple step you can take to improve your digital security is to choose strong passwords. Now this sounds very basic and it is, but not having strong passwords opens you up to potential attacks.  If you are worried about remembering lots of different passwords, you can use a password manager that can create and securely passwords for you. 

 

Avoid attachments  

The National: credit: Google Imagescredit: Google Images

Again, another basic one but it’s worthwhile mentioning. Both you and any members of staff should be advised that before downloading an attachment or clicking on an email link for that matter, to make sure that it has been sent from a known source.  If it’s not from someone that you know, it’s acceptable to contact the source to ask that they verify they sent the email.  

 

Back up your data 

The National: credit: Google Imagescredit: Google Images

Backing up your data is crucial as you can imagine. Should you ever be subject to a cyber-attack, it won’t just have financial implications and customers personal records stolen, there is the possibility that vital data required for running your business could be lost. 

When backing up data, it is best to use multiple methods. A good back-up system would include: 

  • daily incremental back-ups to a portable device and or cloud storage service 
  • end-of-week server back-ups 
  • quarterly server back-ups 
  • yearly server back-ups 

 

Hire a professional 

The National: credit: Google Imagescredit: Google Images

The role to ensure that the proper security measurements are in place no longer falls into the hands of IT. There are now professionals who’s dedicated role is to put security measurements in place and maintain that. For example, data scientist jobs are filled with professionals who have a good understanding of cyber security threats and are able to quickly and effectively respond to them. 

 

As cyber security threats rise, so does the demand for professionals who can deal with them. Recruitment agencies like Empiric specialise in providing staff for positions of this type. 

Considering how damaging a breach can be, don’t delay any longer, prepare for the unexpected.

 

There is of course more information available to make sure that you are being thorough when implementing cyber security.   

 

 

 

 

*This commercial content is compiled via expert opinion. Clicking in certain hyperlinks within this article will redirect you to a 3rd party.