Page 8 - PA_Enterprise_September-2023
P. 8

PAE






          from weak or re-used passwords and remind           13: Guard against physical theft
          you to change them regularly.                       While you need to be mindful of hackers trying
                                                              to breach your network, don’t forget that your
          11: Use a firewall                                  hardware can be stolen too. Unauthorized
          A firewall protects hardware as well as             individuals should be prevented from gaining
          software, which is a benefit to any company         access to business devices such as laptops,
          with its own physical servers. A firewall also      PCs, scanners, and so on. This may include
          works by blocking or deterring viruses from         physically securing the device or adding a
          entering your network. This is in contrast to       physical tracker to recover the device in case
          an antivirus which works by targeting the           of loss or theft. Ensure all your employees
          software affected by a virus that has already       understand the importance of any data that
          gotten through.                                     might be stored on their cell phones or laptops
                                                              when out and about.
          Ensuring a firewall is in place protects your
          business’s network traffic – both inbound and       For devices used by multiple employees,
          outbound. It can stop hackers from attacking        consider creating separate user accounts
          your network by blocking certain websites. It       and profiles for additional protection. It’s also
          can also be programmed so that sending out          a good idea to set up remote wiping – this
          sensitive data and confidential emails from         allows you to remotely delete the data on a
          your company’s network is restricted.               lost or stolen device.

          Once your firewall is installed, remember to        14: Don’t overlook mobile devices
          keep it up-to-date. Check regularly that it has     Mobile devices create security challenges,
          the latest updates for software or firmware.
                                                              especially if they hold sensitive information or
                                                              can access the corporate network. Yet they can
          12: Use a Virtual Private Network (VPN)             sometimes be overlooked when businesses

          A Virtual Private Network provides another          are planning their cybersecurity. Ask your
          layer of security for your business. VPNs allow     employees to password-protect their mobile
          employees to access your company’s network          devices, install security apps, and encrypt their
          securely when working remotely or travelling.       data to stop criminals from stealing information
          They do this by funnelling your data and IP         while the phone is on public networks. Be sure
          address through another secure connection           to set reporting procedures for lost or stolen
          in between your own internet connection and         phones and tablets.
          the actual website or online service you need
          to access. They are especially useful when          15: Ensure third parties who deal with you
          using public internet connections – such as in      are also secure
          coffee shops, airports, or Airbnb’s – which can     Be wary of other businesses such as partners
          be vulnerable to hackers. A VPN gives users         or suppliers who may be granted access to
          a secure connection which separates hackers         your systems. Make sure they are following
          from the data they are hoping to steal.             similar practices to you. Don’t be afraid to

                                                              check before you grant access to anybody.

                                                                                    www.kaspersky.com



         8                                                                                    September 2023
   3   4   5   6   7   8   9   10   11   12   13