Simple tips to improve your cybersecurity posture
Don’t forget the basics of good IT security practice, as these translate into a solid baseline for a good cybersecurity posture:
- use commercial antivirus, consistent across all devices
- have a backup strategy that is monitored and tested regularly
- enforce strong passwords and two factor authentication systems
- perform regular system patching
These four very basic tasks go a long way to help protect the IT network as a whole, and are part of the Essential Eight from the Australian Signals Directorate.
Adoption of good cybersecurity practices and behaviours MUST to come from the top down – it needs to be part of the company culture. If there’s a mentality that “the hackers won’t target us as we’re not big enough”, then that’s exactly what makes you more vulnerable and what the criminals are looking for – your business is an easy target for them.
A great starting point to encourage a strong is a set of cybersecurity policy documents, including a Cybersecurity Incident Response Plan, which work together to describe what you and your IT service provider are undertaking to prevent cyber security incidents, and what to do when a cyber incident occurs. Share these with your team so they know that you’re serious about it, and they should be too.
Hackers are always trying to trick staff who are busy and stressed to click on links in emails or enter logon credentials into fake websites. It’s called phishing, and is an extremely common method used to compromise a victims’ system. It’s just the tip of the iceberg though – what about whaling, vishing, tailgating, or water holing? Or shoulder surfing, juice jacking, or rowhammering?
Providing staff with cybersecurity awareness training and talking about it regularly within your team, helps to build a proactive cybersecurity consciousness and confidence that protects your business like no piece of technology possibly can.
Although the bad guys are pretty smart, the technology that the good guys have at their disposal is now powered by artificial intelligence and machine learning, with devices across a network working together to form a web of synchronized security. The days of a simple antivirus are long over!
You need protection on your computers, servers, cloud services, and the type of smarts that products like Sophos XG routers, Sophos Intercept-X, and Sophos Managed Threat Response provide.
We connect the pieces of the puzzle so that you’re safer, smarter, and can get on with business.