Tel 01491 833222
Head Cog

Our Blog

Learn from our observations, insights and ideas.
  • Home
  • Grants
  • Our Blog
  • How to Protect yourself from Cyber Threats

How to Protect yourself from Cyber Threats

How to Protect yourself from Cyber Threats

Backup and Restore

It can be a distressing experience to lose vital business information. If you make regular backups and your data is lost, you’ll be able to easily recover it. Think about the following:

- Backup Horizon - how far back do you need to see backed up information? Don't overwrite backups that you need!

- Off-Site - Security & encryption are included so your data will be safe

- On-Site - for speed of recovery an on-site backup for most recent info is a great idea

- Full system Recovery? - If you system is important then make total system snapshots

- Theft of your data - Make sure you keep customer records safe

- Staff Records and information - these need to be kept safe, so password protect them!

You can backup to local drives as well as cloud servers.

 

Firewall Protection

A firewall is a network security system, either hardware or software based, that uses rules to control incoming and outgoing network traffic. A firewall acts as a barrier between a trusted network and an untrusted network.

In addition, a firewall controls access to the resources of a network through a positive control model. This means that the only traffic allowed onto the network is defined in the firewall policy; all other traffic is denied.

You can have a firewall on your internet connection and on your PC/Laptop. Make sure it's turned on and kept up to date.

 

AV Protection

You’ve probably been told countless times that anti-virus software is really important, but it is still worth reiterating that point. If you want to stay safe online, it can help to have some good anti-virus/anti-malware software installed. While it won’t give you licence to download and click everything you like with impunity, it can certainly help to spot those things that might slip through the net. Just remember to keep the software up to date though – new threats are emerging all the time, and your security software needs to know about them to be able to spot them. If you’re unsure about what you need, read some of the many reviews online and choose a recommended package – but do make sure that your PC has some protection.

However careful we may be, there will always be moments when our anti-virus software is unable to protect us from harm.

AV typically eliminates all types of threats, including viruses, rootkits, worms and spyware with optional Cloud Malware Protection Systems.

A computer virus is a kind of malware which, when executed, replicates by inserting copies of itself (possibly modified) into other programs and then the computer is “infected”. Viruses often perform some type of harmful activity such as stealing hard disk space or CPU time.

Make sure it's turned on and kept up to date.

 

Malware Protection

Malware is a general term used to refer to hostile or intrusive software and is short for malicious software, sometimes known as a computer contaminant. It’s any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Malwarebytes adds protective layers to programs and web browsers

- protects from infected web sites with malicious links

- Ransomware protection

- Stops files being locked

Make sure it's turned on and kept up to date.

We could say that Malware will steal and a Virus will harm your computer.

 

Be careful about opening attachments...

When you receive an email with files attached, it can be easy to open those attachments without thinking. The simple advice here would be don’t. Unless you are absolutely certain where the email came from, and that the attachment is ok, you’d be much better off not opening the attachment at all.

Furthermore, even if you’re happy that the attachment is ok, remember to give it a scan with your virus scanner before opening it - you’re always better being safe than sorry in these situations. So, rather than simply double clicking and opening the attachment in your email, save it to your computer first so that you can scan it before opening - typically, right-clicking on the file will bring up a menu containing a command (activated with a left-click) to scan the file with your chosen anti-virus software. If the scan finds a problem, you can then delete the file without ever having to open it.

 

...And clicking on links

Links in emails might take us to phishing sites (fake sites that look like the real thing – set up to trick us into giving away personal and financial details) or directly download viruses and malware.

Unless you are absolutely certain that an email is genuine, and that clicking on the link will be safe, don’t risk it. If you receive an unexpected email containing links, even from someone you might trust, you should not click on any of the links – attackers can spoof email addresses to make them look like ones you trust, and they can even hack your friends’ email accounts to spam you from there.

If you’re not sure, you can always visit the website of the company you think has emailed you directly from your web browser.

 

Passwords

Successful attacks can compromise any passwords you might have stored on your computer. Keeping your passwords encrypted within a password manager can help, but some other password rules are also important.

Never use the same password more than once (a difficult task, made much easier by using a password manager – where you’ll only ever have to remember one password), and change your passwords if you think you’ve been the victim of an attack.

Also, to make your data even safer, you should always enable two-factor authentication/two-step verification where available.

2FA - Two Factor Authentication, also known as 2FA, two step verification or TFA (as an acronym), is an extra layer of security that is known as "multi factor authentication" that requires not only a password and username but also something that only, and only, that user has on them.

Use a Password Management tool.

 

Keep your operating system up to date

Cyber-attacks are often successful because of security holes on PCs. Often, these flaws are spotted by the operating system vendors (like Microsoft and Apple) and fixed by way of security updates.

Downloading these security updates can help to keep your PC safe from some of the latest attacks. However, if you don’t install your operating system’s security updates you are leaving yourself vulnerable to attack.

 

Click here to take some some free Cyber Training – 2 hours

You can also contact Flex Information Technology Ltd on 0333 101 7300 or email This email address is being protected from spambots. You need JavaScript enabled to view it. for help and advice.

Flex Information Technology Ltd

Heart of business

Our mentor team

  • Rosemary

    Rosemary

  • David

    David

  • Jackie

    Jackie

  • Nathan

    Nathan


Oxford Hob Limited Copyright © 2014 - Website powered by CHANNEL MEDIA CREATIVE