Page 8 - PA_Enterprise_September-2023
P. 8
PAE
from weak or re-used passwords and remind 13: Guard against physical theft
you to change them regularly. While you need to be mindful of hackers trying
to breach your network, don’t forget that your
11: Use a firewall hardware can be stolen too. Unauthorized
A firewall protects hardware as well as individuals should be prevented from gaining
software, which is a benefit to any company access to business devices such as laptops,
with its own physical servers. A firewall also PCs, scanners, and so on. This may include
works by blocking or deterring viruses from physically securing the device or adding a
entering your network. This is in contrast to physical tracker to recover the device in case
an antivirus which works by targeting the of loss or theft. Ensure all your employees
software affected by a virus that has already understand the importance of any data that
gotten through. might be stored on their cell phones or laptops
when out and about.
Ensuring a firewall is in place protects your
business’s network traffic – both inbound and For devices used by multiple employees,
outbound. It can stop hackers from attacking consider creating separate user accounts
your network by blocking certain websites. It and profiles for additional protection. It’s also
can also be programmed so that sending out a good idea to set up remote wiping – this
sensitive data and confidential emails from allows you to remotely delete the data on a
your company’s network is restricted. lost or stolen device.
Once your firewall is installed, remember to 14: Don’t overlook mobile devices
keep it up-to-date. Check regularly that it has Mobile devices create security challenges,
the latest updates for software or firmware.
especially if they hold sensitive information or
can access the corporate network. Yet they can
12: Use a Virtual Private Network (VPN) sometimes be overlooked when businesses
A Virtual Private Network provides another are planning their cybersecurity. Ask your
layer of security for your business. VPNs allow employees to password-protect their mobile
employees to access your company’s network devices, install security apps, and encrypt their
securely when working remotely or travelling. data to stop criminals from stealing information
They do this by funnelling your data and IP while the phone is on public networks. Be sure
address through another secure connection to set reporting procedures for lost or stolen
in between your own internet connection and phones and tablets.
the actual website or online service you need
to access. They are especially useful when 15: Ensure third parties who deal with you
using public internet connections – such as in are also secure
coffee shops, airports, or Airbnb’s – which can Be wary of other businesses such as partners
be vulnerable to hackers. A VPN gives users or suppliers who may be granted access to
a secure connection which separates hackers your systems. Make sure they are following
from the data they are hoping to steal. similar practices to you. Don’t be afraid to
check before you grant access to anybody.
www.kaspersky.com
8 September 2023