Click Here for Subsidised Web Design Services for Bexley Businesses

Cyber Security Best Practices for Business

Date updated: 10 March 2024 | by Sybil Mayard

Cybercrime is constantly on the rise; make sure to keep yourself, your business and your customers safe by following the tips in this blog.

By following good cyber security practices, you can enjoy a safe and secure experience both online and offline.

Don't Delay, Update Your Devices Today!

Install an antivirus product on your devices and keep it up to date. Carry out a virus scan regularly to detect and remove any malicious software.

Keep all of your devices' operating system software up to date. By default, devices are usually set to download and install the updates automatically. However, if this will be disruptive to your working day, add an appointment to your calendar to remind yourself to manually install the updates at a more convenient time.

Only download apps and software from legitimate sources and always install the latest version.

Be Careful With Your Passwords

Do not reuse passwords across multiple websites!

Do not store passwords on spreadsheets, emails, hard drives, or on paper. Instead, use a password manager such as LastPass or Dashlane. Password managers are simple, secure and convenient to use. Both of these platforms include a free plan which allows you to store an unlimited number of passwords. Once you have stored all of your passwords in the password manager, go through your notes and emails, and delete any that contain passwords.

For each account, create a strong, unique password. A strong password is at least 16 characters long, consisting of a random combination of uppercase and lowercase letters, numbers and special characters (such as @, #, _, -, &, *, ^). For some interesting stats, download the famous Hive Systems Password Table which illustrates how long it takes for a hacker to brute force a password in 2023.

Where possible, set up 2-factor authentication, or 2FA (also known as two-step verification). This adds an extra layer of security to your account because the access requires 2 forms of identification (the password and a security code). The most common form of authentication for 2FA is SMS verification, which involves sending a text message to your phone containing a unique security code. As well as your password, you would need to enter this code into the website to gain access to your account. Never share your security code with others.

When setting up 2FA, you should also create a backup method to access your account if you lose your phone. This is usually in the format of a recovery code. Please store your recovery codes in a safe place such as in a password manager.

Do not share login information with others.

Manage Permissions Wisely

If your organisation hires employees or contractors, each user will need their own, separate login for each account. Logins should not be shared between users. Remember the "Principle of Least Privilege"; that is, don't automatically grant all users admin permissions. Instead, provide each user with the lowest level of access required to perform his or her job effectively and keep the number of users with admin permissions down to a minimum. Delete logins for users who no longer work for your organisation.

Protect Your Data and Others' Data

Lock the screen when away from your computer or laptop. If possible, enable the encryption feature on your laptop. BitLocker is available for Windows, and FileVault for Mac.

Do not store personal data for longer than it is needed.

Keep devices and documents stored safely and away from unauthorised personnel.

Keep all of your documents and data backed up. Create one backup in the cloud and at least one other backup on a physical hard drive stored in a location different from where you usually work. Back up your work frequently, ideally once a day.

Here are a few options for cloud backup solutions, all of which offer a free plan for a limited amount of storage space:

Have an incident response procedure in place and in the event of an incident, notify the relevant parties immediately.

Beware of Spam

If you get inundated with junk emails every day, it can be tempting to click the Unsubscribe link at the bottom of the emails. Never click this link or respond to the emails as this indicates to the spammers that your email address is active and could result in your receiving even more junk mail.

Learn How to Identify Scam Emails and Texts

Scam emails and texts often contain phrases like the following to lure you into taking action:

Do not click links in suspicious emails or texts. These links can take you to a website that looks like a genuine site but isn't, in an attempt to steal your personal information.

Do not open attachments from suspicious emails. Attachments can contain viruses or other malware that can also steal your information or harm your computer.

Never respond to an email that promises a large amount of money in return for your personal information.

Look at the email address of the sender. If the domain (the part after the @ sign) doesn't match the company it appears to be coming from, then it's fake.

Microsoft account unusual sign-in activity

Read the email carefully and look for spelling, punctuation and grammar mistakes.

Microsoft account did you attempt to change your password

Look out for the generic "Dear customer" greeting.

Learn how to spot deceptive links. Do not click on links; instead, hover over the links and buttons to check if the links are genuine:

Phishing email appearing to be from Amazon

If you receive a suspicious email, report it as Phishing via your email program and delete it immediately. You can also block the sender to avoid receiving further emails from this sender, however, this is usually ineffective as scammers constantly change their email addresses.

Practice Safe Browsing Online

Check that the website you are viewing is actually the one you intended to visit - verify that the URL in the address bar of the browser is correct. Spoof sites can be deceptive and are designed to look identical to the real ones. Have a look at this example of the vehicle enquiry service on the GOV.UK website.

A fake GOV.UK website:

Fake gov.uk vehicle enquiry service website

The genuine GOV.UK website:

Vehicle enquiry service on gov.uk website

Do not enter sensitive data (e.g. contact information or credit card details) on insecure websites. To check if a website is secure, look at the address bar of the browser. The web address should begin with https:// and display a padlock symbol next to it.

Use common sense when shopping online. If prices look too good to be true, proceed with caution!

When away from home or your usual workplace, do not connect to public wi-fi networks. These networks are usually unsecured and do not require a password to be accessed. Instead, use a VPN (virtual private network). A VPN provides an extra layer of security by hiding your IP address and sending/receiving data through an encrypted "tunnel", so you can browse the Internet securely and anonymously. Consider choosing a service such as NordVPN.

If you are accessing your accounts on a public computer, do not leave the computer unattended and always log out when you finish your session. Some websites can save your username or email address to make logging in faster - do not check this box if using a public or shared computer. Below is an example of a warning on an online banking site:

Halifax Online Banking login form

Ensure That Your Website is Secure

If you manage your own website, install an SSL (Secure Sockets Layer) certificate on your website. When a website has an SSL certificate enabled, the web address will begin with https:// rather than http://, and the browser will display a padlock icon in the address bar. A secure website builds trust and reassures your customers that their data is safe on your website.

Most website builders provide an SSL certificate for free, so you would not normally have to worry about this. However, if you are using WordPress or another content management system that does not provide one, you can obtain a free SSL certificate from Let's Encrypt or purchase one from your domain provider.

Additional tasks for WordPress users: make sure to update your plugins, themes and core WordPress files often (I recommend checking once a week). Updating your WordPress site helps to keep it protected against security threats and vulnerabilities.

Stay Informed

There are many resources available online to help you stay up to date with the latest cyber security issues and tools to reduce your cyber risk. Here are a few to get you started:

Would You Like To Start A Project With Me?

Click the contact button to get in touch with your requirements