things you haven t done to protect your business from cybercrime

Similar documents
How to prevent computer viruses in 10 steps

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

A Decision Maker s Guide to Securing an IT Infrastructure

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Why The Security You Bought Yesterday, Won t Save You Today

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

HoneyBOT User Guide A Windows based honeypot solution

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security

YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next

The Importance of Patching Non-Microsoft Applications

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

Cybersecurity Best Practices

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

NATIONAL CYBER SECURITY AWARENESS MONTH

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Five Tips to Reduce Risk From Modern Web Threats

Five Best Practices to Improve Building Management Systems (BMS) Cybersecurity

Streamlining Web and Security

Computer and Network Security Policy

What Do You Mean My Cloud Data Isn t Secure?

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

Vulnerability Scanning and Patch Management

How to complete the Secure Internet Site Declaration (SISD) form

Boston University Security Awareness. What you need to know to keep information safe and secure

Internet threats: steps to security for your small business

Compliance series Guide to meeting requirements of the UK Government Cyber Essentials Scheme

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

Online Valuation Portal User Guide

Protecting Your Organisation from Targeted Cyber Intrusion

What you need to know to keep your computer safe on the Internet

Small businesses: What you need to know about cyber security

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem

BSHSI Security Awareness Training

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Windows Operating Systems. Basic Security

Firewalls for small business

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.

Document ID. Cyber security for substation automation products and systems

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

FSOEP Web Banking & Fraud: Corporate Treasury Attacks

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Breaking the Cyber Attack Lifecycle

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Common Cyber Threats. Common cyber threats include:

WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Did you know your security solution can help with PCI compliance too?

A practical guide to IT security

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

Cyber Essentials Questionnaire

The Fundamental Failures of End-Point Security. Stefan Frei Research Analyst Director

DOBUS And SBL Cloud Services Brochure

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Computer Viruses: How to Avoid Infection

ONLINE RECONNAISSANCE

Basic Computer Security Part 2

General Security Best Practices

Top 10 Tips to Keep Your Small Business Safe

Anti-exploit tools: The next wave of enterprise security

October Is National Cyber Security Awareness Month!

TIME TO LIVE ON THE NETWORK

Cyber Essentials Scheme

Data Access Request Service

Transcription:

5 things you haven t done to protect your business from cybercrime

5 things you can do to protect your business from cybercrime

27,000,000,000

27billion is a big number and is what the UK government estimates as the annual cost of cybercrime to individuals and businesses 1. The global cost is estimated at $300billion to $1trillion 2. Global revenues from cybercrime in 2011 were estimated at $12.5Billion dollars 3. The point is cybercrime is a big business and a big problem. Hackers are well funded and well organised. What started 40 years ago as a means for nerds to gain kudos from one another is now a big business with the mafia professionalising what was a previously disorganised group. With so much to gain, if you re a hacker working in a billion dollar business, you re going to make sure you reach your victims, so you test your malware against common security products to make sure it will get through. That s why Anti Virus software and firewalls alone will not make you invulnerable. So let us to show you the 5 things, easiest first, you can do to better protect you business. 1. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60943/the-cost-of-cyber-crime-full-report.pdf 2. www.mcafee.com/uk/resources/reports/rp-economic-impact-cybercrime.pdf 3. www.group-ib.com/index.php/7-novosti/630-russian-speaking-cybercriminals-earned-45-billion-in-2011-researchers-estimate

1 Train your staff

The best means of attack is through social engineering and hackers look to trick us to download their code. Your staff need to understand the risks they face so they take the threat seriously. They need to know how they can be attacked so they can spot attempted attacks and know how to deal with them. To help you do this, you can download our free cyber crime training pack based on our own in-house security induction training you can use to bring you and your staff up-to-speed. DOWNLOAD YOUR FREE TRAINING PACK

My grandmother Ethel paid 39 for a blue rinse 2 Use passphrases to create your passwords

Mrs Sugden knew a thing or two about the power of changing hair colour. But she may not have realised its part in cyber-security. A strong password should have a minimum password length of 12 to 14 characters, include lowercase and uppercase alphabetic characters, numbers and symbols and be randomly generated. However, this makes for a password that is very difficult to remember. As an alternative, passphrases or passphrase derived passwords are easy to remember, whilst remaining difficult to crack. The phrase My grandmother Ethel paid 39 for a blue rinse Becomes the passphrase MygrandmotherEthelpaid 39forabluerinse or if this is too long, the password MgEp 39fabr using the first letters of each word. When you need to change the password, change a word in the passphrase: My grandmother Ethel paid 39 for a pink rinse My uncle Bert paid 39 for a blue rinse My grandmother Ethel paid 32 for a blue rinse The more interesting you make the phrase, the easier it is to remember.

3 Ditch Windows XP

It s been around for more than a decade but with Microsoft stopping the release of security patches for Windows XP back in April 2014, now really is the time to ditch Windows XP for good and move on to something that is more secure and supported. The 16% desktop Operating System market share that XP still holds is going to attract criminals like moths to a flame so expect an increase in the number of Windows XP exploits that are found from which you won t be protected. If you really can t get rid of it, block off any computers using Windows XP from the internet with your firewall. Click to Talk We re here to help

4 Block outbound traffic on your firewall

You ve already got a firewall to protect your network from incoming traffic (haven t you?). To reduce the chances of data leaking from your network in the event it is compromised, allow outbound internet access on known safe ports only. This is because malware often communicates to command and control servers on non-standard ports. Blocking these can help limit the damage if you are compromised. Click to download our list of recommended outbound ports cheat sheet below. DOWNLOAD OUR PORT CHEAT SHEET

5 Regularly patch your systems

Hackers look for vulnerabilities in commonly used software. The most obvious of these is the operating system, with Windows being the prime target because of it s huge installed base. But other widely used software such as Adobe Reader, Adobe Flash, Java, Firefox and Chrome are also targets. You should make it a priority to regularly update your software on your computers. Turn on automatic updates and encourage your staff to keep these turned on and check that machines are up-to-date. Ideally this should be automated. Unfortunately there is a small risk that patching can make previously working systems stop working - for this you need to remove problem patches. Stellarise can automate patching across your computers so it is scheduled to happen at the least disruptive time, monitored so you know it has happened and you can stay compliant, filtered to remove patches you don t want and includes 3rd party support for common problem applications. Click to Talk We re here to help

6 Talk to us

Rate this content and help Stellarise improve. We want to create great content for you (not for us), so we d like to hear what you thought of this guide Just click on the image to let us know how you re feeling and give us your feedback in a matter of seconds.

Like what you read? Then share with your friends.

Stellarise are a complete outsourced IT team for growing businesses that want to maximise the way their IT supports them. Of course we keep your network, servers and systems humming sweetly, but what gets us really excited is helping our clients work productively wherever they are. Or delivering realtime sales performance data to the CEO s iphone. Or allowing customers to book appointments online by opening up existing systems. Click to Talk We re here to help support disaster recovery custom development custom hosting