Seven IT security tips to implement now

Malware, ransomware, viruses, trojans – the list of possible threats to your computers and your network seems to be growing by the day.

Image Credit

According to research, the global cost of cybercrime is expected to exceed 2tn in the next three years.

Below you will find seven useful security tips:

1. Password control

Use strong passwords of at least 12 characters made up of numbers, special characters and letters. Do not share your passwords – as tempting as it might be to let your colleagues sort something for you when you are away, this is a big no-no! Change passwords on a regular basis and try not to use the same password for multiple sites/log-ins to minimise any breaches.

2. Sharing is not always good

Always double check who you are sending your email to. Sometimes you might fall foul of the autofill function. Hitting reply to all instead of reply has also seen many unfortunate incidents, so be sure to check the recipients before pressing send.

Image Credit

3. Inbox safety

Over 90 per cent of advanced cyberattacks begin with a dodgy email. Make sure that you enable your email scanner to flag suspicious emails as possible spam, do not trust attachments from unknown sources, and disable automatic previewing.

If you are looking for a company to help you tackle the threats to which your company is exposed, experts such as should be your first port of call.

4. Control your endpoints

Endpoint security management is a hot topic. Essentially, it means having control of your employees endpoint devices, such as laptops, mobile phones and tablets, and ensuring that access to the network is selectively granted.

5. Keep security at the forefront

Develop a plan for employees to follow when a potential security risk is flagged. This could be contacting the in-house IT team or the external IT provider, or informing all colleagues within earshot.

6. Keep devices secure

Apply encryption software to all PCs, laptops and USB drives, and encourage staff not to leave portable devices unguarded.

7. Selective access

Regularly evaluate who has access to data, both in terms of viewing it and editing it. If roles change, make sure that the correct employees have the correct permissions. Always verify third-party access and make sure that contractors only have permissions for the duration of their contract.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.