Does the idea of cybersecurity strike fear into your heart? We know it’s not every business’ specialty, but that doesn’t make it any less important for companies like yours to consider. Today, we want to make it as easy as possible for your employees to practice appropriate cybersecurity measures, and that starts with a simple one-page cybersecurity cheat sheet.
Feel free to print this out, post it in a public place in your office, or send it to employees as needed.
3 Considerations for Network Security
The Golden Rule of Passwords
The simplest way to think about password security is: never reuse, and never share.
If you use the same password as your work-related accounts for your social media accounts, you are effectively putting the company’s data at risk. If a hacker were to crack your social media accounts or gain access to passwords in some other way (like a data breach or data leak), not only are your own accounts at risk, but so is the business. You should use the company-approved password manager; it’s there to help you optimize account security in the easiest and simplest way possible.
Remember, unique passwords should be unique; don’t reuse passwords under any circumstance.
Practice the S.T.O.P. Method
The most powerful security tool at your disposal is simply to stop and think.
Cybercriminals depend on this click-happy behavior, and they will send out emails that look an awful lot like shipping notifications, invoices, or other common documents. Instead of giving them what they want, you can combat their efforts with the S.T.O.P. framework:
- S - Scrutinize the Sender - Does the email address match the name? Look for tiny typos or inconsistencies (for example, micr0soft.com instead of microsoft.com).
- T - Think about the Ask - Is the person asking for passwords, money, or sensitive data? Chances are any legitimate sender will not do this.
- O - Observe the Link - Before clicking on any link from any sender, you can hover over it with the mouse to “preview” the URL. Check the link to make sure it’s legitimate.
- P - Phone a Friend - If the email feels off, or if there is a lot of urgency associated with the request, call the person or send them a message to verify their identity. In situations where you’re just not sure, send it to your IT resource for verification.
Take 2 minutes to think; it might just save the business from a ransomware attack or other dangerous cybersecurity threat.
Only Use Company-Approved Devices and Apps
It’s vital that you only use devices and applications provided by the company; otherwise, the risk of data exposure increases exponentially.
We understand you’re just trying to get work done in a more efficient way, but moving company data to off-network devices creates problems for data backups, encryption, cybersecurity, and operations in general. If you feel like you can get things done faster using a different device or software solution, ask IT. We are open to replacing older, slower tools with better, more efficient ones, but we need to do it in a way that doesn’t put data at risk.
Remember, we want to help you do your job, and we’re here to support you, so give us a call at +61295186000 for a consultation.