SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Ten topon keepyour
Ten top tips
on keeping your
business secure
Ten top tips on keeping your business secure
With the threat landscape constantly developing, it has never been more important
for businesses to be vigilant when it comes to security. An attack on your business can
not only mean a loss in productivity, but it may lead to a loss of brand credibility and,
in future, fines that could total up to tens of thousands of pounds.
To help you stay ahead of the hackers, here are our top 10 tips on keeping your
business secure.
Implement a multi-layered defence
Being confident that your business is not just
about installing anti-virus software, it’s about
having a solution at every level and for every
threat, from malware to opportunist thieves.
It’s about physically securing devices so that
they can’t be picked up and removed; it’s about
choosing the right passwords – as long as
possible and preferably a mix of letters and
numbers; installing firewalls to prevent attacks
from the internet; using virtual private networks
(VPN) to access data securely from outside
of the business network; using mobile device
management (MDM) tools to wipe mobile
devices if they’re stolen; preventing rogue
applications being downloaded; and helping
your front-line and back-room employees to
understand the reasons you need to be secure.
Get your users on side
Security has to start at the grass roots. A business
can have the most sophisticated firewalls and
anti-virus software, but if an employee gives away
their corporate username and password, through
a clever phishing email, or selecting a password
that’s simple to guess, then that security will
count for nothing.
In the past, attacks were largely brute force attacks
and weren’t targeted at any particular type of
business. Over the years, the attacks on businesses
have started to become more sophisticated, and are
now targeted at specific people in an organisation
and may involve sophisticated social engineering
as part of the strategy.
Employees need to understand the duty they have
in keeping data safe, the potential costs associated
with any breach, and the need to be vigilant at all
times, both in and out of work. Many businesses
ask new employees to sign ridiculously long IT
policy agreements that nobody but the lawyers
read. While this may cross all the T’s and dot
the I’s, it is not going to be effective in preventing
breaches. Security policies need to be simple to
understand and need to be updated frequently
as threats change. The clearer the policy, the
more likely you are to get your employees on
side and the fewer breaches you’re likely
to have.
1 2
Ten top tips on keeping
yourbusiness secure
Be social media aware
Social media has become a fact of life, everyone
uses it and there’s no chance of you being able
to ban it, unfortunately it’s also one of the ways
that many employees are targeted for attack.
Employees should manage what they disclose
on social media as the information in a social
media post can often provide the intelligence
to make phishing emails from potential hackers
look more authentic.
Consider looking at some of the tools available
that help lock down social media and flag potential
problems. For example: Bitdefender’s Safego is
a free privacy app designed to stop phishing links
in Facebook, or Norton’s Safe Web an application
that scans web pages to highlight potentially
unsafe links.
Make passwords secure
Choosing an effective password is one of the
cheapest and easiest ways to ensure your business
is protected. One of the advantages of low-cost
cloud services like Amazon is that hackers are
able to access huge amounts of computing power
to break passwords. To make things harder for the
hacker, you need to choose an effective password.
Adding numbers, special characters, and upper
and lower case characters will make a password
hard to crack.
For example, if your password consists of four
digits and you only use numbers, there will be ten
to the power of four (10,000) possibilities. If you then
add alphabetic characters (a-z in lower case) to the
numeric, you get 36 to the power of four possibilities
(1.6 million). By using numbers, special characters
and upper and lower case characters in a longer
password, say 11 digits, you will effectively force
any cracking program used to choose from 104
characters multiplied by 11 digits, resulting in
15,394,540,563,150,776,827,904 possibilities.
This increases the time needed to crack a
password from seconds to millions of years.
However, it’s important to note that these
techniques are being improved and enhanced
all of the time. As computing power increases,
so do attack methods, which is why you need
to change passwords regularly.
Use passwords on everything
One of the areas where people tend not to use
passwords, but should, is on mobile phones.
When mobile phones were simply devices to talk
on, a password didn’t really matter. But phones
have now turned into smartphones and, increasingly,
businesses are run from them. According to a
survey by security business Sophos*, around half
(47%) of all phone users use their personal mobile
devices for business purposes, but one in three
(34%) admit they do not actually use passwords
on these devices even though they keep office
email, confidential documents, customer contact
information and budget information on them.
Because of this ability to access business secrets,
a lost or stolen mobile phone becomes a quick and
easy way for any thief to get access to millions
of pounds worth of valuable data. Look at Mobile
Device Management (MDM) software that allows
the business to monitor access to a mobile device
(tablet devices included) and remotely wipe the
devices should they fall into the wrong hands.
Update your programs regularly
One of the ways hackers use to attack systems
is to exploit bugs in known applications and in the
operating systems that sit on our computers and
mobile devices. To make sure that you’re not open
to these hacks, you will need to make sure that
your computers and devices are properly patched
and updated.
With Sage 200 Online you’ll enjoy automated
back-ups, updates and upgrades. Automated
backups are taken daily, monthly and yearly and
stored on the Microsoft Azure platform. Frequently
updating your programs and operating systems
will keep your business up to date on any
recent issues.
3 5
4
Ten top tips on keeping your business secure
6
* Source - Sophos Mobile Security Threat Report – 2012
Make a move to the cloud
More and more businesses are looking to the cloud
to provide their infrastructure and applications, and
many are choosing to make the move to the cloud
to improve their security. A recent survey by the
Harvard Business Review** for Verizon revealed
that more than a third (36%) of businesses say that
cloud actually increases their security and nearly
three quarters (71%) expect cloud to reduce
complexity in their business. Indeed, a move to
the cloud will remove the time and cost involved
in constantly updating your applications because
with cloud you always have the most up-to-date
version of the software available.
To choose the right cloud service for your business
you need to research the provider and ask if they
have any history of serving other customers with
your requirements. Asking if they conform to any
cloud-specific accreditations, such as ISO/IEC
27001:2005, used for Sage 200 software, means
you can ensure security and reliability. If you need
a quick decision then see if they’re approved for
the Governments G-Cloud service; if they are then
they’re good enough for your business.
They should also be able to provide reports for how
the data is managed and accessed, and what – if
any – audit data is provided. With Sage, you will
be safe in the knowledge that your business data
is held in data centres managed and operated by
Microsoft Global Foundation Services in Europe.
You should also nail down the contractual
arrangements and security provisions in the Service
Level Agreement (SLA) to determine where data
will be stored, how access is given, how it will
be protected.
Keep track of who uses what
One of the disadvantages of the cloud is that it’s
often too simple for people in the business to use,
and this leads to Shadow IT – cloud applications
bought in by individual employees, the marketing
department, sales etc. An October 2014 survey***
by Netskope found that the average number of
‘shadow IT’ applications in use in an enterprise is
579, of which 88.7% are consumer-based and don’t
have the standard security and checks you expect
from an application designed for enterprises.
Having access to data anytime, anywhere is
great - Sage 200 offers the option to access data
when away from the office or out on the road. But
keep business data safe by allowing only authorised
users access key information through an internet
connection, enabling you to use a wide variety of
mobile devices, amongst a select and secure
number of staff.
To mitigate the numbers and types of applications
in use, you first need to find out what’s out there
and then find alternatives, but make sure that the
alternatives are not only acceptable by you, but also
your employees. The ‘shadow IT’ applications will
not go away, and if you outlaw them, others will
quickly replace them. Your employees have resorted
to them because the business hasn’t been agile
enough and they see an answer to a problem that
helps them in their job. You need to do the same,
but obviously you need to choose something with
greater security
7 8
Ten top tips on keeping your business secure
**Source - Business Agility in the Cloud – Harvard Business Review/Verizon – www.hbr.org – July 2014
***Source - Cloud Report 2014 – Netskope – www.netskope.com – Oct 2014
Sage (UK) Limited,
North Park, Newcastle upon Tyne NE13 9AA © Sage (UK) Limited 2014 registered in England No.1045967 01/15
Get a plan for the inevitable
Being proactive over security should help you
prevent attacks from malware, viruses and
even insider attacks. However, they will never
guarantee you’re 100% protected. Prepare for
the worst and make sure that, if you couldn’t stop
a breach happening, then at least you can spot
a breach after it’s happened.
Create recovery solutions to help get your servers
back up and running if an attack does occur.
Also, get your teams to practice dealing with the
media – that way, if the reputation of your business
is on the line, you and they won’t make it any worse
by saying the wrong thing.
Get insured
Recent research from the Economist Intelligence
Unit revealed that the demand for insurance against
potential IT losses is growing strongly, and is no
longer purely something for very large organisations.
Working in conjunction with Microsoft, Sage 200
software manages your finances, customers and
business insight in one solution. Designed to easily
share data; work smarter and ensure your business
works together efficiently, Sage 200 runs on the
Microsoft Azure platform, which is hosted from
data centres managed and operated by Microsoft
Global Foundation Services (GFS).
9 10
Sage 200 ERP manages your finances, customers and business insight in one
solution. Designed to easily share data; work smarter and ensure your business
works together efficiently, it gives you the added peace of mind that your data
is secure and can be accessed anywhere and anytime.
To find more call 0845 111 9988, email customer.development@sage.com
or visit www.sage.co.uk/erp
Ten top tips on keeping your business secure

Weitere ähnliche Inhalte

Was ist angesagt?

The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentIBM Security
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware IBM Security
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyIBM Security
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...IBM Security
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productGFI Software
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsIBM Security
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsIBM Security
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016IBM Security
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itIBM Security
 
Tolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't SeeTolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't SeeIBM Security
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?Web Werks Data Centers
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 

Was ist angesagt? (20)

The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threats
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
Tolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't SeeTolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't See
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 

Andere mochten auch

Sage 300 ERP Operations Distribution Management
Sage 300 ERP Operations Distribution ManagementSage 300 ERP Operations Distribution Management
Sage 300 ERP Operations Distribution ManagementBurCom Consulting Ltd.
 
The 6 Benefits of ERP as a Financial Management System
The 6 Benefits of ERP as a Financial Management SystemThe 6 Benefits of ERP as a Financial Management System
The 6 Benefits of ERP as a Financial Management SystemBurCom Consulting Ltd.
 
Grow forward with faster simpler and flexible erp
Grow forward with faster simpler and flexible erpGrow forward with faster simpler and flexible erp
Grow forward with faster simpler and flexible erpBurCom Consulting Ltd.
 
Making the move to Sage ERP from Outgrown Quickbooks
Making the move to Sage ERP from Outgrown QuickbooksMaking the move to Sage ERP from Outgrown Quickbooks
Making the move to Sage ERP from Outgrown QuickbooksBurCom Consulting Ltd.
 
Extending the power of CRM across your business
Extending the power of CRM across your businessExtending the power of CRM across your business
Extending the power of CRM across your businessBurCom Consulting Ltd.
 

Andere mochten auch (9)

Whitepaper Agile Finances
Whitepaper Agile FinancesWhitepaper Agile Finances
Whitepaper Agile Finances
 
Success on an International Scale
Success on an International ScaleSuccess on an International Scale
Success on an International Scale
 
Sage 300 ERP Operations Distribution Management
Sage 300 ERP Operations Distribution ManagementSage 300 ERP Operations Distribution Management
Sage 300 ERP Operations Distribution Management
 
The 6 Benefits of ERP as a Financial Management System
The 6 Benefits of ERP as a Financial Management SystemThe 6 Benefits of ERP as a Financial Management System
The 6 Benefits of ERP as a Financial Management System
 
Grow forward with faster simpler and flexible erp
Grow forward with faster simpler and flexible erpGrow forward with faster simpler and flexible erp
Grow forward with faster simpler and flexible erp
 
Making the move to Sage ERP from Outgrown Quickbooks
Making the move to Sage ERP from Outgrown QuickbooksMaking the move to Sage ERP from Outgrown Quickbooks
Making the move to Sage ERP from Outgrown Quickbooks
 
A Guide to Hybrid ERP Solutions
A Guide to Hybrid ERP SolutionsA Guide to Hybrid ERP Solutions
A Guide to Hybrid ERP Solutions
 
The Sage Business Index 2014
The Sage Business Index 2014The Sage Business Index 2014
The Sage Business Index 2014
 
Extending the power of CRM across your business
Extending the power of CRM across your businessExtending the power of CRM across your business
Extending the power of CRM across your business
 

Ähnlich wie Ten Top Tips on Keeping Your Business Secure

Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfTuring.com
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfAhad
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxAhad
 
Managed Services: Turning Pandemic Into Profitable Protection
Managed Services: Turning Pandemic Into Profitable ProtectionManaged Services: Turning Pandemic Into Profitable Protection
Managed Services: Turning Pandemic Into Profitable ProtectionThe TNS Group
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015anpapathanasiou
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekkoDMI
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingDanielle Bowers
 
Network security
Network securityNetwork security
Network securityROBERT S
 
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdfFour Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdfEnterprise Insider
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdfTop 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdfMobibizIndia1
 
Managing data security and privacy in call centres ankur gupta
Managing data security and privacy in call centres   ankur guptaManaging data security and privacy in call centres   ankur gupta
Managing data security and privacy in call centres ankur guptaAankur Gupta
 

Ähnlich wie Ten Top Tips on Keeping Your Business Secure (20)

The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdf
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptx
 
Managed Services: Turning Pandemic Into Profitable Protection
Managed Services: Turning Pandemic Into Profitable ProtectionManaged Services: Turning Pandemic Into Profitable Protection
Managed Services: Turning Pandemic Into Profitable Protection
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
 
Network security
Network securityNetwork security
Network security
 
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdfFour Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdfTop 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
 
Managing data security and privacy in call centres ankur gupta
Managing data security and privacy in call centres   ankur guptaManaging data security and privacy in call centres   ankur gupta
Managing data security and privacy in call centres ankur gupta
 

Mehr von BurCom Consulting Ltd.

Sage action brief: Three steps to driving business efficiency
Sage action brief: Three steps to driving business efficiencySage action brief: Three steps to driving business efficiency
Sage action brief: Three steps to driving business efficiencyBurCom Consulting Ltd.
 
Promoting your business abroad. A marketer's guide to exporting.
Promoting your business abroad.  A marketer's guide to exporting.  Promoting your business abroad.  A marketer's guide to exporting.
Promoting your business abroad. A marketer's guide to exporting. BurCom Consulting Ltd.
 
What is a Business Management Solution? And how will it help my business?
What is a Business Management Solution? And how will it help my business?What is a Business Management Solution? And how will it help my business?
What is a Business Management Solution? And how will it help my business?BurCom Consulting Ltd.
 
Automate time and attendance: Seven reasons it makes good sense
Automate time and attendance: Seven reasons it makes good senseAutomate time and attendance: Seven reasons it makes good sense
Automate time and attendance: Seven reasons it makes good senseBurCom Consulting Ltd.
 
IT investment decision-making with confidence
IT investment decision-making with confidenceIT investment decision-making with confidence
IT investment decision-making with confidenceBurCom Consulting Ltd.
 
Sage ERP Front-to-Back Office Integration
Sage ERP Front-to-Back Office IntegrationSage ERP Front-to-Back Office Integration
Sage ERP Front-to-Back Office IntegrationBurCom Consulting Ltd.
 
Staying compliant in Canada: A discussion of the rules that govern HRM consid...
Staying compliant in Canada: A discussion of the rules that govern HRM consid...Staying compliant in Canada: A discussion of the rules that govern HRM consid...
Staying compliant in Canada: A discussion of the rules that govern HRM consid...BurCom Consulting Ltd.
 
Meet and respond to the HR management challenges you face every day
Meet and respond to the HR management challenges you face every dayMeet and respond to the HR management challenges you face every day
Meet and respond to the HR management challenges you face every dayBurCom Consulting Ltd.
 
How 2-Tier ERP Can Benefit Your Business
How 2-Tier ERP Can Benefit Your BusinessHow 2-Tier ERP Can Benefit Your Business
How 2-Tier ERP Can Benefit Your BusinessBurCom Consulting Ltd.
 
Inventory optimization and the informed business
Inventory optimization and the informed businessInventory optimization and the informed business
Inventory optimization and the informed businessBurCom Consulting Ltd.
 
Five critical HR challenges in manufacturing
Five critical HR challenges in manufacturingFive critical HR challenges in manufacturing
Five critical HR challenges in manufacturingBurCom Consulting Ltd.
 
Sage Intelligence 101 Microsoft® Excel® tips and tricks
Sage Intelligence 101 Microsoft® Excel® tips and tricksSage Intelligence 101 Microsoft® Excel® tips and tricks
Sage Intelligence 101 Microsoft® Excel® tips and tricksBurCom Consulting Ltd.
 
Five quick wins to help CIOs drive growth
Five quick wins to help CIOs drive growthFive quick wins to help CIOs drive growth
Five quick wins to help CIOs drive growthBurCom Consulting Ltd.
 
A guide to budgeting & forecasting solutions
A guide to budgeting & forecasting solutionsA guide to budgeting & forecasting solutions
A guide to budgeting & forecasting solutionsBurCom Consulting Ltd.
 

Mehr von BurCom Consulting Ltd. (20)

Manage your cash flow
Manage your cash flowManage your cash flow
Manage your cash flow
 
Sage action brief: Three steps to driving business efficiency
Sage action brief: Three steps to driving business efficiencySage action brief: Three steps to driving business efficiency
Sage action brief: Three steps to driving business efficiency
 
Work life balance for business owners
Work life balance for business ownersWork life balance for business owners
Work life balance for business owners
 
Improve bid-hit-ratio
Improve bid-hit-ratioImprove bid-hit-ratio
Improve bid-hit-ratio
 
Sage Job Ready Guide
Sage Job Ready GuideSage Job Ready Guide
Sage Job Ready Guide
 
Guide to Time Management
Guide to Time ManagementGuide to Time Management
Guide to Time Management
 
Promoting your business abroad. A marketer's guide to exporting.
Promoting your business abroad.  A marketer's guide to exporting.  Promoting your business abroad.  A marketer's guide to exporting.
Promoting your business abroad. A marketer's guide to exporting.
 
What is a Business Management Solution? And how will it help my business?
What is a Business Management Solution? And how will it help my business?What is a Business Management Solution? And how will it help my business?
What is a Business Management Solution? And how will it help my business?
 
Automate time and attendance: Seven reasons it makes good sense
Automate time and attendance: Seven reasons it makes good senseAutomate time and attendance: Seven reasons it makes good sense
Automate time and attendance: Seven reasons it makes good sense
 
IT investment decision-making with confidence
IT investment decision-making with confidenceIT investment decision-making with confidence
IT investment decision-making with confidence
 
Sage ERP Front-to-Back Office Integration
Sage ERP Front-to-Back Office IntegrationSage ERP Front-to-Back Office Integration
Sage ERP Front-to-Back Office Integration
 
Staying compliant in Canada: A discussion of the rules that govern HRM consid...
Staying compliant in Canada: A discussion of the rules that govern HRM consid...Staying compliant in Canada: A discussion of the rules that govern HRM consid...
Staying compliant in Canada: A discussion of the rules that govern HRM consid...
 
50 tried & tested business tips
50 tried & tested business tips50 tried & tested business tips
50 tried & tested business tips
 
Meet and respond to the HR management challenges you face every day
Meet and respond to the HR management challenges you face every dayMeet and respond to the HR management challenges you face every day
Meet and respond to the HR management challenges you face every day
 
How 2-Tier ERP Can Benefit Your Business
How 2-Tier ERP Can Benefit Your BusinessHow 2-Tier ERP Can Benefit Your Business
How 2-Tier ERP Can Benefit Your Business
 
Inventory optimization and the informed business
Inventory optimization and the informed businessInventory optimization and the informed business
Inventory optimization and the informed business
 
Five critical HR challenges in manufacturing
Five critical HR challenges in manufacturingFive critical HR challenges in manufacturing
Five critical HR challenges in manufacturing
 
Sage Intelligence 101 Microsoft® Excel® tips and tricks
Sage Intelligence 101 Microsoft® Excel® tips and tricksSage Intelligence 101 Microsoft® Excel® tips and tricks
Sage Intelligence 101 Microsoft® Excel® tips and tricks
 
Five quick wins to help CIOs drive growth
Five quick wins to help CIOs drive growthFive quick wins to help CIOs drive growth
Five quick wins to help CIOs drive growth
 
A guide to budgeting & forecasting solutions
A guide to budgeting & forecasting solutionsA guide to budgeting & forecasting solutions
A guide to budgeting & forecasting solutions
 

Kürzlich hochgeladen

0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 

Kürzlich hochgeladen (20)

Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 

Ten Top Tips on Keeping Your Business Secure

  • 1. Ten topon keepyour Ten top tips on keeping your business secure
  • 2. Ten top tips on keeping your business secure With the threat landscape constantly developing, it has never been more important for businesses to be vigilant when it comes to security. An attack on your business can not only mean a loss in productivity, but it may lead to a loss of brand credibility and, in future, fines that could total up to tens of thousands of pounds. To help you stay ahead of the hackers, here are our top 10 tips on keeping your business secure. Implement a multi-layered defence Being confident that your business is not just about installing anti-virus software, it’s about having a solution at every level and for every threat, from malware to opportunist thieves. It’s about physically securing devices so that they can’t be picked up and removed; it’s about choosing the right passwords – as long as possible and preferably a mix of letters and numbers; installing firewalls to prevent attacks from the internet; using virtual private networks (VPN) to access data securely from outside of the business network; using mobile device management (MDM) tools to wipe mobile devices if they’re stolen; preventing rogue applications being downloaded; and helping your front-line and back-room employees to understand the reasons you need to be secure. Get your users on side Security has to start at the grass roots. A business can have the most sophisticated firewalls and anti-virus software, but if an employee gives away their corporate username and password, through a clever phishing email, or selecting a password that’s simple to guess, then that security will count for nothing. In the past, attacks were largely brute force attacks and weren’t targeted at any particular type of business. Over the years, the attacks on businesses have started to become more sophisticated, and are now targeted at specific people in an organisation and may involve sophisticated social engineering as part of the strategy. Employees need to understand the duty they have in keeping data safe, the potential costs associated with any breach, and the need to be vigilant at all times, both in and out of work. Many businesses ask new employees to sign ridiculously long IT policy agreements that nobody but the lawyers read. While this may cross all the T’s and dot the I’s, it is not going to be effective in preventing breaches. Security policies need to be simple to understand and need to be updated frequently as threats change. The clearer the policy, the more likely you are to get your employees on side and the fewer breaches you’re likely to have. 1 2 Ten top tips on keeping yourbusiness secure
  • 3. Be social media aware Social media has become a fact of life, everyone uses it and there’s no chance of you being able to ban it, unfortunately it’s also one of the ways that many employees are targeted for attack. Employees should manage what they disclose on social media as the information in a social media post can often provide the intelligence to make phishing emails from potential hackers look more authentic. Consider looking at some of the tools available that help lock down social media and flag potential problems. For example: Bitdefender’s Safego is a free privacy app designed to stop phishing links in Facebook, or Norton’s Safe Web an application that scans web pages to highlight potentially unsafe links. Make passwords secure Choosing an effective password is one of the cheapest and easiest ways to ensure your business is protected. One of the advantages of low-cost cloud services like Amazon is that hackers are able to access huge amounts of computing power to break passwords. To make things harder for the hacker, you need to choose an effective password. Adding numbers, special characters, and upper and lower case characters will make a password hard to crack. For example, if your password consists of four digits and you only use numbers, there will be ten to the power of four (10,000) possibilities. If you then add alphabetic characters (a-z in lower case) to the numeric, you get 36 to the power of four possibilities (1.6 million). By using numbers, special characters and upper and lower case characters in a longer password, say 11 digits, you will effectively force any cracking program used to choose from 104 characters multiplied by 11 digits, resulting in 15,394,540,563,150,776,827,904 possibilities. This increases the time needed to crack a password from seconds to millions of years. However, it’s important to note that these techniques are being improved and enhanced all of the time. As computing power increases, so do attack methods, which is why you need to change passwords regularly. Use passwords on everything One of the areas where people tend not to use passwords, but should, is on mobile phones. When mobile phones were simply devices to talk on, a password didn’t really matter. But phones have now turned into smartphones and, increasingly, businesses are run from them. According to a survey by security business Sophos*, around half (47%) of all phone users use their personal mobile devices for business purposes, but one in three (34%) admit they do not actually use passwords on these devices even though they keep office email, confidential documents, customer contact information and budget information on them. Because of this ability to access business secrets, a lost or stolen mobile phone becomes a quick and easy way for any thief to get access to millions of pounds worth of valuable data. Look at Mobile Device Management (MDM) software that allows the business to monitor access to a mobile device (tablet devices included) and remotely wipe the devices should they fall into the wrong hands. Update your programs regularly One of the ways hackers use to attack systems is to exploit bugs in known applications and in the operating systems that sit on our computers and mobile devices. To make sure that you’re not open to these hacks, you will need to make sure that your computers and devices are properly patched and updated. With Sage 200 Online you’ll enjoy automated back-ups, updates and upgrades. Automated backups are taken daily, monthly and yearly and stored on the Microsoft Azure platform. Frequently updating your programs and operating systems will keep your business up to date on any recent issues. 3 5 4 Ten top tips on keeping your business secure 6 * Source - Sophos Mobile Security Threat Report – 2012
  • 4. Make a move to the cloud More and more businesses are looking to the cloud to provide their infrastructure and applications, and many are choosing to make the move to the cloud to improve their security. A recent survey by the Harvard Business Review** for Verizon revealed that more than a third (36%) of businesses say that cloud actually increases their security and nearly three quarters (71%) expect cloud to reduce complexity in their business. Indeed, a move to the cloud will remove the time and cost involved in constantly updating your applications because with cloud you always have the most up-to-date version of the software available. To choose the right cloud service for your business you need to research the provider and ask if they have any history of serving other customers with your requirements. Asking if they conform to any cloud-specific accreditations, such as ISO/IEC 27001:2005, used for Sage 200 software, means you can ensure security and reliability. If you need a quick decision then see if they’re approved for the Governments G-Cloud service; if they are then they’re good enough for your business. They should also be able to provide reports for how the data is managed and accessed, and what – if any – audit data is provided. With Sage, you will be safe in the knowledge that your business data is held in data centres managed and operated by Microsoft Global Foundation Services in Europe. You should also nail down the contractual arrangements and security provisions in the Service Level Agreement (SLA) to determine where data will be stored, how access is given, how it will be protected. Keep track of who uses what One of the disadvantages of the cloud is that it’s often too simple for people in the business to use, and this leads to Shadow IT – cloud applications bought in by individual employees, the marketing department, sales etc. An October 2014 survey*** by Netskope found that the average number of ‘shadow IT’ applications in use in an enterprise is 579, of which 88.7% are consumer-based and don’t have the standard security and checks you expect from an application designed for enterprises. Having access to data anytime, anywhere is great - Sage 200 offers the option to access data when away from the office or out on the road. But keep business data safe by allowing only authorised users access key information through an internet connection, enabling you to use a wide variety of mobile devices, amongst a select and secure number of staff. To mitigate the numbers and types of applications in use, you first need to find out what’s out there and then find alternatives, but make sure that the alternatives are not only acceptable by you, but also your employees. The ‘shadow IT’ applications will not go away, and if you outlaw them, others will quickly replace them. Your employees have resorted to them because the business hasn’t been agile enough and they see an answer to a problem that helps them in their job. You need to do the same, but obviously you need to choose something with greater security 7 8 Ten top tips on keeping your business secure **Source - Business Agility in the Cloud – Harvard Business Review/Verizon – www.hbr.org – July 2014 ***Source - Cloud Report 2014 – Netskope – www.netskope.com – Oct 2014
  • 5. Sage (UK) Limited, North Park, Newcastle upon Tyne NE13 9AA © Sage (UK) Limited 2014 registered in England No.1045967 01/15 Get a plan for the inevitable Being proactive over security should help you prevent attacks from malware, viruses and even insider attacks. However, they will never guarantee you’re 100% protected. Prepare for the worst and make sure that, if you couldn’t stop a breach happening, then at least you can spot a breach after it’s happened. Create recovery solutions to help get your servers back up and running if an attack does occur. Also, get your teams to practice dealing with the media – that way, if the reputation of your business is on the line, you and they won’t make it any worse by saying the wrong thing. Get insured Recent research from the Economist Intelligence Unit revealed that the demand for insurance against potential IT losses is growing strongly, and is no longer purely something for very large organisations. Working in conjunction with Microsoft, Sage 200 software manages your finances, customers and business insight in one solution. Designed to easily share data; work smarter and ensure your business works together efficiently, Sage 200 runs on the Microsoft Azure platform, which is hosted from data centres managed and operated by Microsoft Global Foundation Services (GFS). 9 10 Sage 200 ERP manages your finances, customers and business insight in one solution. Designed to easily share data; work smarter and ensure your business works together efficiently, it gives you the added peace of mind that your data is secure and can be accessed anywhere and anytime. To find more call 0845 111 9988, email customer.development@sage.com or visit www.sage.co.uk/erp Ten top tips on keeping your business secure