Tips to keep your business safe online

1 July 2019 Information Security, Products & Solutions

No business, whether large or small, can afford to ignore cybersecurity, and the pressure to protect businesses is mounting as cybercriminals hone their skills to target a company’s weakest points. While bigger corporations generally have large IT departments to respond to evolving threats such as crypto-jacking and ransomware attacks, small and medium-sized enterprises (SMEs) don’t have these huge IT teams to protect them, says Carey van Vlaanderen, CEO at ESET South Africa.

Carey van Vlaanderen
Carey van Vlaanderen

Cybersecurity needn’t be a daunting challenge for small business owners, and there are several key steps that can be taken to significantly reduce the chances of your business becoming a victim of cybercrime. These steps can save your business time, money and even your reputation. Moreover, SMEs that manage their cybersecurity effectively will have a competitive advantage in today’s online and interactive world.

Back up your data

It is imperative that in the digital age, businesses are making data backup and protection a high priority. It’s important to think about how much your business relies on data, whether that’s customer information, quotes, orders or payment details – all can be considered critical. All SMEs need to ensure that they are making backups of their data, and that these are done regularly and can be restored. The backups should always be kept separate from your computer. This is so the business can keep functioning if anything bad does happen.

Furthermore, if you have backups of your data that you can quickly recover, you can't be blackmailed through ransomware attacks. It is worth considering storing the backups in the cloud – as well as being separate from your computer, it is also often a cheaper solution for SMEs. This is because cloud providers supply your organisation with data storage and web services without you needing to invest in expensive hardware up front.

Keep your devices safe

Mobile technology is now an essential part of any modern business, with more of our data being stored on tablets and smartphones. However, it’s a regular occurrence in businesses that devices go missing, get lost or get stolen, and many of these devices contain important data too. To protect this information, all employees should be encouraged to use a suitably complex PIN or password to secure their device. Ideally you should ensure all lost or stolen devices can be tracked, locked or wiped remotely. On top of that, all devices should always have their software kept up to date as manufacturers often include security updates to keep devices protected.

Use strong passwords

As mentioned above, all employees should use password protection on their devices. Passwords, when implemented correctly, are a free, easy and effective way to prevent unauthorised users from accessing devices. Use two-factor authentication (2FA) on your important accounts such as email and account management dashboards. This means that even if an attacker knows your passwords, they still won’t be able to access that account.

Protect yourself from malware and phishing attacks

Malware (malicious software) is software intended to infiltrate and damage or disable computers and can often be distributed through phishing attacks in which scammers send fake emails asking for sensitive information or containing links to bad websites. The first step in protecting your business from malware and phishing attacks is ensuring that all employees always exercise caution before opening any attachments, clicking on links in emails or visiting unfamiliar websites.

The second is ensuring that your software is up to date and that all relevant protection is applied. Finally, all SMEs should run antivirus and intrusion detection software, which can determine when an infection is about to take place and prevent it.

ESET offers Endpoint Protection Advanced Cloud for small businesses. The company’s IT security software incorporates ransomware protection along with the easily manageable ESET Cloud Administrator, which maximises convenience and slashes hardware expense for business of all sizes. To read more about ESET’s solutions, visit https://www.eset.com/int/business/small-business/





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Africa’s largest Zero Trust platform
NEC XON Information Security Commercial (Industry)
Africa has reached a significant cybersecurity milestone with the successful deployment of the continent’s largest Palo Alto Networks Prisma Access and Prisma Access Browser Zero Trust environment, supporting secure remote access for more than 40 000 users for a large enterprise in Africa.

Read more...
Supply chain attacks top threat over 12 months
Information Security
Supply chain attacks have become the most prevalent cyberthreat confronting businesses over the past year, according to a new Kaspersky global study, with nearly one-third of companies worldwide experiencing a supply chain threat in the past year.

Read more...
From vibe hacking to flat-pack malware
Information Security AI & Data Analytics
HP issued its latest Threat Insights Report, with strong indications that attackers are using AI to scale and accelerate campaigns, and that many are prioritising cost, effort, and efficiency over quality.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Microsoft 365 security is a ticking time bomb
Information Security
Across boardrooms and IT departments, a dangerous assumption persists that because data is stored in Microsoft 365 and Azure, it is automatically secure. This belief is fundamentally flawed and fosters a false sense of protection.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Bringing fire safety closer to home
SafeQuip Fire & Safety Products & Solutions Smart Home Automation
SafeQuip’s latest product launch introduces two compact, disposable fire extinguishers for everyday use, one suitable for Class A, B, and C fires, the other rated for Class A, B and F fires.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.