Page 6 - PA_Enterprise_September-2023
P. 6
PAE
give cybercriminals access to your networks. 3: Deploy antivirus software
There are many scenarios that could result in Choose antivirus software that can protect
employee-initiated attacks. For instance, an all your devices from viruses, spyware,
employee might lose a work tablet or disclose ransomware, and phishing scams. Make
login credentials. Employees may also sure the software not only offers protection,
mistakenly open fraudulent emails, which can but also technology that helps you clean
deploy viruses on your business’ network. devices as needed and resets them to their
pre-infected state. It’s important to keep your
To protect against threats from within, invest antivirus updated to stay safe from the latest
in cybersecurity training for your employees. cyber threats and patch any vulnerabilities.
For example, teach staff the importance of
using strong passwords and how to spot 4: Keep software updated
phishing emails. Establish clear policies As well as antivirus, all the software you use
describing how to handle and protect to keep your business running should be kept
customer information and other vital data. up-to-date. Vendors regularly update their
software to strengthen it or add patches that
2: Carry out risk assessment close security vulnerabilities. Bear in mind
Evaluate potential risks that might compromise that some software, such as a Wi-Fi router’s
the security of your company’s networks, firmware, may need to be manually updated.
systems, and information. Identifying and Without new security patches, a router –
analyzing possible threats can help you devise and the devices connected to it – remain
a plan to plug security gaps. vulnerable.
As part of your risk assessment, determine
where and how your data is stored and who 5: Back up your files regularly
has access to it. Identify who may want to Does your company back up its files? If
access the data and how they may try to obtain a cyberattack happens, data could be
it. If your business data is stored in the cloud, compromised or deleted. If that happened,
you could ask your cloud storage provider to could your business still run? Don’t forget
help with your risk assessment. Establish the to consider the amount of data that may be
risk levels of possible events and how breaches stored on laptops and cell phones – without
could potentially impact your company. this, many businesses wouldn’t be able to
function.
Once this analysis is complete and you
have identified threats, use the information To help, make use of a backup program that
you have collated to develop or refine your automatically copies your files to storage.
security strategy. Review and update this In the event of an attack, you can restore
strategy at regular intervals and whenever all your files from your backups. Choose a
you make changes to information storage program that gives you the ability to schedule
and usage. This ensures your data is always or automate the backup process so you
protected to the best of your ability. don’t have to remember to do it. Store copies
of backups offline so they don’t become
6 September 2023