4 Tips to Keep your Business Cyber Safe


Business Security


It is more common than ever to hear or read about large corporations being attacked by computer hackers, putting customers’ data at risk. Its not just big corporations being hit though, small businesses are increasingly finding themselves victims of one cyber crime or another. It’s time to batten down the hatches!

1. Assess what could be at risk

Its crucial to make sure that you know and understand the security needs of your business. This will enable you to create an effective and fit-for-purpose risk management or disaster recovery plan, just in case the worst does happen.

2. Establish security best practices

Following this, its a great and simple idea to establish some security best practices within your business, such as changing passwords regularly, having a select few, identified people allowed to access sensitive data and implementing regular security training, are just a few options to consider.

3. Invest in business-grade antivirus and malware protection

It may seem obvious, but the amount of businesses that do not invest in quality software is surprising. It’s important to remember that there is no such thing as free protection. These free programs are essentially ‘demos’ of full products, and so provide only a stripped back version with limited functionality.

Its also key to recognise that Viruses and Trojans operate undercover, so whilst you and your staff may be web-safety savvy, it’s impossible to avoid all of the dangers on the internet.

Above all else, it is a business’s duty to protect any customer data they may hold, and a decision not to invest in proper antivirus could end up affecting many others.

4. DON’T hide your WiFi network

At one time, it was considered a method of security to hide your routers SSID (Service Set Identifier), however, this has been proven as a complete myth.

Unmasking a hidden SSID is actually quite an easy task. Whilst you can prevent your router from including its SSID in its beacon, you can’t stop it from including that information in its data packets, which is easily discoverable using a network analyser found in a simple web search.