Page 24 - Cyber Warnings
P. 24







that more advanced hackers are unable to get hold of information that may compromise your
security. You should also make use of the built-in tracking software, which enables you to
remotely lock or wipe devices that go missing – this software comes as standard with iOS and
Android.


4: Take care when installing new software

When downloading and installing new software or plug-ins for your browser, it's always
advisable to proceed with caution. Free software and applications from a provider whose name
isn't recognized and trusted can often contain spyware or even install harmful programs on your
computer. You can ask your system administrator to apply settings that only allow staff to install
approved programs.


5: Don't get caught out by phishing


With so much awareness about phishing, it's surprising how many people still fall for it. Make
sure your staff are vigilant about any emails asking them to click on links or open attachments,
even if they seem to be from legitimate sources. Phishing scams are becoming increasingly
elaborate, and sometimes it can be hard to tell the difference between a genuine email from a
bank or other organization and a fake one. Once you click on a link or download a file from such
an email, you could end up with unwanted software or scripts running on your computer.



6: Watch out for ransomware

Hackers are constantly finding new and clever ways to take advantage of businesses that fail to
keep themselves secure, and ransomware is a method that is becoming increasingly common.
Ransomware uses a virus to encrypt and hold your important files hostage, so to speak,
refusing to release them back to you until you pay up.

You can protect yourself against this by using the 3-2-1 rule: store three copies of all important
files in two separate devices, one of which is in a different physical location and not connected
to other back-ups. Using cloud storage is a simple and increasingly secure way to do this.



7: Maintain privacy when out in the open

As well as in the office, you need to keep your data safe when your staff are working remotely.
To offer them a secure, encrypted connection to your network with access to files, applications,
printers, and other resources, you can set up a virtual private network (VPN).

This will also protect your staff from hackers when they're using public Wi-Fi hotspots, which
can be particularly vulnerable to attack.




24 Cyber Warnings E-Magazine – May 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   19   20   21   22   23   24   25   26   27   28   29