Cyber Security
The Cyber Security Basics You Should be Covering Now
Achieving full protection when it comes to cyber security risks can seem daunting for even the smallest of businesses. Even if you can’t access the huge budgets that big corporations have at their disposal, there are some basic solutions you can put in place to protect your business.
5 Cyber Security Basics You Can Implement Relatively Cheaply
Even if you are a small or medium-size business with a very limited budget, there are a number of solutions which need to be implemented with relative immediacy.
1. Understand What Assets Are At Risk
We use a wide range of devices to access software and the internet nowadays. You might use a desktop in the office, a laptop at a local café or a smartphone or tablet while on the move. Software and data is no longer placed on a protected server within the organisation but can be accessed from anywhere in the world via the cloud.
Our assets when it comes to cyber security are more wide-ranging and, in some cases, can seem quite nebulous, than ever before. They are all, however, vital to daily operations and need to be protected. It’s important to know what you use and how it might affect your online security.
That means carrying out a regular inventory:
- What hardware such as desktops, laptops and smartphones do you have?
- If you use remote workers to support your business, how are you connecting to them and protecting data?
- What remote or local servers are you using?
- What cloud services are you and your staff employing?
- What virtual machines are you using? What software?
This inventory gives you the basis for understanding your cyber security risks and needs. For example, you may allow BYOD in your business which can present specific challenges when you incorporate your software and data sharing onto someone’s private device.
2. Fill in the Gaps
Once you do an inventory, the likelihood is that you will spot areas where your security isn’t covering your business as you might like. This can happen for a variety of different reasons:
- You may not have implemented a cyber security solution in the first place.
- There might have been a solution, but it was turned off by someone using the software.
- You might already have been the victim of a malware attack that turned the security measure off.
Once you know where the problems lie, you have the chance to put things right and repair your system so that it works more effectively.
The more assets that you use in your business, the more complicated it can be to address all the issues, especially if you are short of time. That may mean outsourcing your IT to a third party who can ensure the gaps are plugged, allowing you and your teams to focus on the business. The key here is that plugging the gaps in your security should be a priority.
3. Auditing Permissions
Who has access to the vital parts of your business? Most companies will limit permissions depending on what job someone does and their position within the organisational structure. These are often not monitored closely enough which means that the potential for a cyber security breach increases. For instance, if someone gives another person their password to access important information, it is putting your business at risk.
It’s also important to check things like user passwords and how these are managed:
- Are they robust and are they changed at regular intervals?
- Do some people have access to more areas in your business than they really need?
- Are there old accounts still operational even though staff have left the business?
Checking permissions on a regular basis is important and will ensure that everyone has the right access and security is kept intact.
4. Developing a Cyber Security Policy and Implementing It
It’s important also to have a cyber security policy for your business, even if you are an SME. The purpose of this is to provide the framework on which all your company security works.
It should include clear guidelines on how employees should behave online, how they use your data and software, who is responsible for ensuring compliance, and what you need to do in the event of a breach.
Even if you do have a cyber security policy in place, it’s vital to ensure that this is being implemented properly. That means having a regular audit to check processes are being adhered to and any changes that need to be made are actually being made and recorded.
For example:
- You may have run a training session to make staff aware of your cyber security policy and what is expected of them. But have you onboarded new employees properly? Do you need to provide a refresher session?
- Is the person who is responsible for implementing certain parts of your cyber security policy doing it properly? Do they need further training, or do you need to change personnel?
- Are there things that need to be added to your cyber security policy following changes in the operation of your business?
5. Embrace Automation
Finally, it’s important as much as possible that you don’t leave your cyber security at the mercy of human error. That includes making sure you have automatic updates and patch downloads for devices rather than waiting for employees to do it themselves. Automation not only reduces human error it can save time and money as well.
When you undertake your audit, do it with a mind of looking for areas where you can include automation.
Cyber security is most certainly a big challenge to businesses, particularly SMEs. These small steps should help tighten up and streamline your current posture and keep you safer online.
If you’d like to find out how a fully managed, tailored IT support service can benefit your business, contact the team at Cyan Solutions today.
Categories
- Case Study
- Charities
- Cloud Computing
- 10 Ways to be More Productive with Microsoft 365
- Cloud Based Services for Business
- Top Cloud Computing Trends
- Myth-busting Cloud Technology
- Technology to Minimise the Disruption Of School Holidays
- Cyan delivers a tailored cloud based solution
- Managing Security With Remote Workers
- What Are The Benefits Of GDPR?
- The biggest risk for data breaches is your employees
- Is your business prepared for bad weather?
- How technology innovation can improve efficiencies for charities
- How internet of things is shaping the workplace of the future
- Does a lack of cloud computing standards compromise its use?
- Common places where SMEs slip-up when using the cloud
- Things to consider before choosing a cloud platform
- Just how secure is the cloud? (Spoiler: Very.)
- Reasons to consider remote working
- Cloud computing terms – what do they even mean?
- Essential time-saving apps for SMEs
- Cyber Security
- Industry News Roundup December 2020
- Shocking Cyber Security Stats 2020
- How Staff Accidentally Help Hackers Steal Sensitive Data
- A quick guide to keep personal devices secure
- Three super simple things you can do now to protect your business
- Have You Considered These Risks to Your Business?
- Cyan Approved to Join NCSC Cyber Information Security Partnership (CiSP)
- What Is Cyber Insurance and Does My Business Need It?
- What Is Ransomware and How Should I Protect My Business?
- The End of Life for Windows 7
- What is Cyber Essentials and Why is it Great For Your Business?
- The Cyber Security Basics You Should be Covering Now
- How to Create a Cyber Security Policy for Your Business
- 3 Reasons Businesses Are Still Getting Their Cyber Security Wrong
- Cyber Security Risks You Need to Focus on in 2020
- IT Security Strategy: What You Need to Know
- Essential Recommendations for Business IT Security
- Cyber Security Services
- Remote and Fully Managed IT Support Tailored To Your Needs
- IT Security Strategy: What You Need to Know
- Essential Recommendations for Business IT Security
- How Often Should You Audit Your Business Cybersecurity?
- Managing Cybersecurity Solutions for SMEs
- Cybercrime Is On The Increase
- Monitoring The Dark Web To Stop Security Breaches Fast
- How to protect your business against phishing scams
- Disaster Recovery
- GDPR
- Myth-busting Cloud Technology
- Using The Cloud For Your Disaster Recovery Strategy
- How to Make Sure Your Staff Don’t Breach Your Data Security
- What Are The Benefits Of GDPR?
- Monitoring The Dark Web To Stop Security Breaches Fast
- The biggest risk for data breaches is your employees
- The Dos And Don’ts Around Consent For GDPR Compliance
- Plan. Create. Maintain for GDPR compliance
- Checklist For GDPR Compliance – Are You Ready?
- The Financial Impact and Gains Of GDPR
- What You Need To Know About GDPR: 6 Key Principles
- How GDPR affects charities
- The Data Protection Law Is Changing: What Does Your Business Need To Do?
- IT Budget
- IT Help Desk
- IT Infrastructure
- The End of Life for Windows 7
- What is a Typical IT Budget for a Small or Midsize Business?
- Digital Transformation Of Social Housing – Top Five Trends
- How and Why You Should Use Scalable Technology Infrastructure
- Driving Business Growth Through IT Infrastructure
- How Cyan Solutions Helped Toto Energy drive rapid Growth
- IT Security
- Industry News Roundup August 2020
- Keep devices protected while remote-working
- Have You Considered These Risks to Your Business?
- Cyan Approved to Join NCSC Cyber Information Security Partnership (CiSP)
- What Is Cyber Insurance and Does My Business Need It?
- What Is Ransomware and How Should I Protect My Business?
- The End of Life for Windows 7
- What is Cyber Essentials and Why is it Great For Your Business?
- The Cyber Security Basics You Should be Covering Now
- How to Create a Cyber Security Policy for Your Business
- 3 Reasons Businesses Are Still Getting Their Cyber Security Wrong
- Cyber Security Risks You Need to Focus on in 2020
- IT Security Strategy: What You Need to Know
- Essential Recommendations for Business IT Security
- Cyber Security Services
- IT Security Strategy: What You Need to Know
- Essential Recommendations for Business IT Security
- How Often Should You Audit Your Business Cybersecurity?
- Managing Cybersecurity Solutions for SMEs
- Top 5 Ways To Avoid Phishing Emails
- Key Technology Trends Impacting the Energy Sector
- Top Benefits of Outsourcing Your IT Requirements
- Using The Cloud For Your Disaster Recovery Strategy
- Managing Security With Remote Workers
- Our Guide To IT Budgeting
- How to Make Sure Your Staff Don’t Breach Your Data Security
- Driving Business Growth Through IT Infrastructure
- Plan. Create. Maintain for GDPR compliance
- Flaw in Intel Chips Puts Millions of Computers At Risk
- Does a lack of cloud computing standards compromise its use?
- 10 basic (but essential) business tech security tips
- Just how secure is the cloud? (Spoiler: Very.)
- Cloud computing terms – what do they even mean?
- Essential time-saving apps for SMEs
- IT Services
- 10 Questions to Ask About Your IT Service Provider in 2020
- Virtual CIO Services
- Cloud Based Services for Business
- What is a Typical IT Budget for a Small or Midsize Business?
- Does Outsourcing Mean IT Cost Reduction
- Tips for Finding the Best IT Consulting Solutions
- Top Benefits of Outsourcing Your IT Requirements
- Cyan delivers a tailored cloud based solution
- What support should you expect from your IT provider
- IT Strategy
- Why Your Business Needs an IT Strategy
- Why you should be making plans to implement remote working long-term
- Continuity Checklist
- Have You Considered These Risks to Your Business?
- The End of Life for Windows 7
- What to Include in Your IT Strategy in 2020
- What Does Digital Transformation Mean for Your Business in 2020?
- Essential Recommendations for Business IT Security
- Remote and Fully Managed IT Support Tailored To Your Needs
- Essential Recommendations for Business IT Security
- What is a Typical IT Budget for a Small or Midsize Business?
- Does Outsourcing Mean IT Cost Reduction
- Is Your IT Spending Under Control?
- IT Budget Planning Mistakes You Should Avoid
- What is Your IT Strategy?
- Tips for Finding the Best IT Consulting Solutions
- Embrace New Technology with an IT Transformation Strategy
- Do Your Employees Understand Your IT Business Strategy?
- Digital Transformation Of Social Housing – Top Five Trends
- Top 5 Ways To Avoid Phishing Emails
- Key Technology Trends Impacting the Energy Sector
- Cybercrime Is On The Increase
- Essential Data Back-Up & Disaster Recovery Tips
- Using The Cloud For Your Disaster Recovery Strategy
- Harnessing Technology to Enhance Housing Associations Performance
- Why Your Phone System is an Essential Part of Your Technology Strategy
- Driving Business Growth Through IT Infrastructure
- The Dos And Don’ts Around Consent For GDPR Compliance
- The Importance Of Having A Good Technology Strategy
- Things to consider before choosing a cloud platform
- IT Support
- 10 Questions to Ask About Your IT Service Provider in 2020
- Remote and Fully Managed IT Support Tailored To Your Needs
- What is a Typical IT Budget for a Small or Midsize Business?
- Does Outsourcing Mean IT Cost Reduction
- Tips for Finding the Best IT Consulting Solutions
- Key Technology Trends Impacting the Energy Sector
- Top Benefits of Outsourcing Your IT Requirements
- What support should you expect from your IT provider
- How your customers benefit from using a smart meter
- Microsoft Office 365
- Industry News Roundup December 2020
- 10 Ways to be More Productive with Microsoft 365
- Digital Transformation Of Social Housing – Top Five Trends
- Key Technology Trends Impacting the Energy Sector
- Top Benefits of Outsourcing Your IT Requirements
- Managing Volunteer Teams Through Good Technology
- Microsoft Office 365: Discounts and Subscriptions for Charities
- How technology innovation can improve efficiencies for charities
- News
- Industry News Roundup December 2020
- Industry News Roundup August 2020
- Industry News for July 2020: Remote Working
- Have You Considered These Risks to Your Business?
- Cyan Approved to Join NCSC Cyber Information Security Partnership (CiSP)
- What Is Cyber Insurance and Does My Business Need It?
- What Is Ransomware and How Should I Protect My Business?
- The End of Life for Windows 7
- What is Cyber Essentials and Why is it Great For Your Business?
- The Cyber Security Basics You Should be Covering Now
- How to Create a Cyber Security Policy for Your Business
- 3 Reasons Businesses Are Still Getting Their Cyber Security Wrong
- Cyber Security Risks You Need to Focus on in 2020
- What to Include in Your IT Strategy in 2020
- 10 Questions to Ask About Your IT Service Provider in 2020
- What Does Digital Transformation Mean for Your Business in 2020?
- IT Security Strategy: What You Need to Know
- Essential Recommendations for Business IT Security
- IT Security Strategy: What You Need to Know
- Essential Recommendations for Business IT Security
- How Often Should You Audit Your Business Cybersecurity?
- Managing Cybersecurity Solutions for SMEs
- What is a Typical IT Budget for a Small or Midsize Business?
- Does Outsourcing Mean IT Cost Reduction
- Is Your IT Spending Under Control?
- IT Budget Planning Mistakes You Should Avoid
- What is Your IT Strategy?
- Tips for Finding the Best IT Consulting Solutions
- Embrace New Technology with an IT Transformation Strategy
- Do Your Employees Understand Your IT Business Strategy?
- Digital Transformation Of Social Housing – Top Five Trends
- Top 5 Ways To Avoid Phishing Emails
- Key Technology Trends Impacting the Energy Sector
- Top Cloud Computing Trends
- Myth-busting Cloud Technology
- Top Benefits of Outsourcing Your IT Requirements
- How and Why You Should Use Scalable Technology Infrastructure
- Cybercrime Is On The Increase
- Essential Data Back-Up & Disaster Recovery Tips
- Technology to Minimise the Disruption Of School Holidays
- Cyan delivers a tailored cloud based solution
- Using The Cloud For Your Disaster Recovery Strategy
- Managing Security With Remote Workers
- Our Guide To IT Budgeting
- What support should you expect from your IT provider
- How Blockchain Gives Transparency to Charity Spending
- How to Make Sure Your Staff Don’t Breach Your Data Security
- Harnessing Technology to Enhance Housing Associations Performance
- Why Your Phone System is an Essential Part of Your Technology Strategy
- What Are The Benefits Of GDPR?
- Monitoring The Dark Web To Stop Security Breaches Fast
- Driving Business Growth Through IT Infrastructure
- The biggest risk for data breaches is your employees
- Why Use A Virtual CIO?
- Is your business prepared for bad weather?
- The Dos And Don’ts Around Consent For GDPR Compliance
- The Importance Of Having A Good Technology Strategy
- Plan. Create. Maintain for GDPR compliance
- Checklist For GDPR Compliance – Are You Ready?
- The Financial Impact and Gains Of GDPR
- Managing Volunteer Teams Through Good Technology
- What You Need To Know About GDPR: 6 Key Principles
- How GDPR affects charities
- How your customers benefit from using a smart meter
- The Data Protection Law Is Changing: What Does Your Business Need To Do?
- Microsoft Office 365: Discounts and Subscriptions for Charities
- How to protect your business against phishing scams
- Flaw in Intel Chips Puts Millions of Computers At Risk
- What even is a blockchain?
- 7 must-have apps and software that aid remote working
- How Cyan Solutions Helped Toto Energy drive rapid Growth
- How technology innovation can improve efficiencies for charities
- How internet of things is shaping the workplace of the future
- Does a lack of cloud computing standards compromise its use?
- Some of the most innovative applications of VR by businesses we’ve seen so far
- Common places where SMEs slip-up when using the cloud
- Tips to be more mobile friendly
- Cyan delivers sustainable solutions and increases confidence in IT at Sands
- Will AI ever completely replace human customer service?
- 10 basic (but essential) business tech security tips
- Things to consider before choosing a cloud platform
- How artificial intelligence will affect future business
- Just how secure is the cloud? (Spoiler: Very.)
- Reasons to consider remote working
- Cloud computing terms – what do they even mean?
- Essential time-saving apps for SMEs
- Telecommunications
- Virtual CIO
- Virtual CIO Services
- Is Your IT Spending Under Control?
- IT Budget Planning Mistakes You Should Avoid
- What is Your IT Strategy?
- Tips for Finding the Best IT Consulting Solutions
- Embrace New Technology with an IT Transformation Strategy
- Do Your Employees Understand Your IT Business Strategy?
- Driving Business Growth Through IT Infrastructure
- Why Use A Virtual CIO?