IS USING INTERNET SAFE?

Cyber threats facing businesses are numerous and unpredictable. To avoid most of the disruptions caused by these threats, actions can be taken, starting with making decision-makers aware of cyber risks.
Ransomware, infected websites,
trojans, adware, fraudulent e-mails, and spam: the list of threats that can
affect the corporate network is long. Some are not directly dangerous but
pollute the daily work, others can lead to a significant loss of turnover and
data.
Did you know that some attacks
target accounting functions in particular? Have you ever heard of the "Presidential
Scam "? Have you implemented a security policy within your SME?
Decision-makers: realizing the
problem is already half the way
The greater the security
knowledge of business leaders, the less chance cybercriminals have to achieve
their ends. Some simple actions can be implemented.
Install an antivirus on all
workstations and on the server(s). This
is obviously the basis of protection. Antivirus remains the
only software totally dedicated to protection and today, antiviruses use
advanced technologies for prevention (behavioral analysis, analysis of
processes running on the PC, etc.) and data restoration.
Update the software on the workstations. This is essential because updates often correct security
flaws or vulnerabilities. The easiest way is to allow automatic updates.
Use backup tools and
ensure that they are well connected to the company network and active (NAS type
tools). It has already happened that an SME that has had more than 300 Giga of
data encrypted (with a large ransom demand in bitcoin), while it’s backup
system was not operational.
Manage passwords. Using
so-called strong passwords with characters, numbers and symbols is also a basic
rule of security. The company can also equip itself with tools that generate
dynamic passwords. Changing passwords regularly is also an effective option,
especially on financial services workstations.
Have an external provider specializing in security. In the event of an attack or infection, time is of the
essence. The faster the reaction, the more likely it is to stop the bleeding.
You can also set up an IT charter, even simple, within the company. Prevention is the best
protection. Do not respond to an e-mail that seems suspicious, do not click on
a link, never give out your credentials etc. Likewise, you can prevent the
downloading of software other than useful for the activity of the company,
regulate Internet browsing and the automatic launch of removable media on
workstations, and finally also protect professional smartphones!
Comments
Post a Comment