• Security
  • 07/03/2022
Top 5 Tips on Staying Cyber Secure

In light of recent global events, companies globally are being put on alert. The ongoing conflicts have brought cyber to the forefront, and the NCSC to issue a warning to UK based organisations.

Hackings and cyber attacks are part and parcel of the internet these days. There's no one-set way for how criminals do it, but common techniques are used.

In 2021 alone, the ICO saw a 2,650% surge in email attacks. There is an expectation that this could increase further in 2022. So, as the cyber world becomes even more dangerous, what can you do to ensure safety for your organisation?

We've prepared our top five tips for staying cyber secure:

Do you have a password policy?

Passwords have come under much scrutiny, and there's little excuse for a poor password in 2022. Often, people think they have a solid password - but as this example here highlights, many people rely on easy to guess passwords.

Biometric options are offered on devices and applications now, but there's still some way before this is widespread. In the meantime, why not try implementing the following steps?

  • Configure a minimum password length
  • Use complex passwords, including special characters, numbers and upper/lower case letters.
  • Never use the same password across multiple systems
  • Use a password manager
  • Never write down passwords

Is 2FA enabled on all devices/accounts?

As passwords are traditionally a weak method of logging into an account, two-Factor Authentication (2FA) is an essential cog in securing you from malicious outsiders. Adding an extra layer of security after inputting passwords, 2FA can be the difference between an incredibly costly hack and the inconvenience of changing a password.

Typically, 2FA relies on a code or message sent to your phone or external email account. Barring an incredibly unlikely combination of events, an outsider shouldn't have access to either of these options. So, even if they have a password, they shouldn't be able to access your account. To learn more about 2FA, read Norton's guide here.

Where are your weaknesses?

Mentally step back to the early 2000s for a second. For most people, cyber security wasn't really a pressing issue then. Sure, turning to services such as Limewire in search of the latest songs from Alicia Keys, Kanye West, or 50 Cent might've come with the risk of viruses. But, there was a collective acceptance that off-the-shelf Anti-Virus software would protect us.

These days are long gone. Threats are evolving constantly - has your security moved with it? If the answer is anything other than a definitive yes, it might be time to conduct a cyber security audit. At Fifosys, we're a firm believer in not marking your own homework - by carrying out an audit with an MSP, they can outline where your vulnerabilities lie and the steps you need to take to fix it before it's too late.

When was the last time you did a backup?

Think of how much you rely on your systems. Especially in a world shaped by COVID, technology can be the difference between a business remaining operational or closing its doors. On top of that, your data is priceless, and losing it through a breach, an accident, or any other method can be a catastrophe.

Sometimes it doesn't matter what you do - a disaster is inevitable. If - or when - a disaster strikes, businesses can grind to a halt as they work to get back operational. Consistent and regular backups can be the difference between a minor headache and a full-scale business-critical issue. If you're unsure of your backups, we recommend applying the following steps:

  • Can I live without this data?
  • How often does this data change?
  • Do I have a secure space to store these backups?
  • How quickly can I access this data in light of a disaster?
  • Can I get an MSP to automate this for me?

Do your employees need training?

Traditionally, the weakest link in your cyber security chain is the user, as they're often the cause of most breaches. Social threats are now rife but easily mitigated with proper education. Yet all too often, education is only an after-thought in a post-breach environment.

In 2022, employees can expect even more threats - namely suspicious emails in their inboxes - with a call going out for people to remain vigilant and report anything suspicious. Equally, properly educating staff can lead to unquestionable benefits and added peace of mind for all parties. Not sure where to turn for your training? Why not use a trusted MSP for expert insight?

The Last Word

There is much to be concerned with online. The realities are that cyber security is just too much of an issue to tackle alone. But, we live in a world where it doesn't have to be complex to find a solution.

Here at Fifosys, security has been at the heart of everything we've done for over two decades - and will continue to be. We've been the trusted port in a storm for thousands of organisations in this time - and we'd love to help you too.

It can be a scary place out there, so don't try to go it alone and be the expert. Hire one instead. Get in touch with us today and find out how we can offer you the support you need.

Recent Post

The Cloud Question


Are IT preconceptions holding the business back?


How secure is the Cloud?


The Six R's of Cloud Migration


Cloud Computing and the Property Sector


Related Posts

  • Security
  • Jan

Do we value our data enough to protect it?

I’m sure you know yourself. You know your business. Of course you want to protect everything in it,

Read More
  • Security
  • Jan

Privacy or anonymity? - Which is more important in the digital era?

Technology is evolving quicker than most peoples’ ability to understand it; therefore it is increasi

Read More
  • Security
  • Jan

If all computers are vulnerable, how strong are your security defences?

You should now understand the difference between Privacy, Anonymity and Pseudonymity. which should l

Read More
  • Security
  • Jan

The Cyber Security Landscape - Best Practices to Protect Your Business Data

What business owners consider to be valuable assets will vary from one business owner to another  bu

Read More