Daily Trust

Protecting your business from cyber threats

-

Business.gov.au, meanwhile, outlined several measures that businesses can take to reduce the risk of cyberattac­ks. Here are some of the standard practices:

1. Data back-up

Backing up data is among the most cost-effective ways of making sure informatio­n is recovered in an event of a cyber incident or computer issues. The department recommende­d using multiple back-up methods to help ensure data safety, including daily incrementa­l back-ups to a portable device or cloud storage, and end-of-week, quarterly, and yearly server back-ups. Backed up data should also be checked regularly to see if it is working properly and can be restored.

As for portable devices, the department said they should not be left connected to a computer to prevent infection and should be stored separately offsite as protection from theft and other physical damage. Cloud storage, meanwhile, should use strong encryption methods and multifacto­r authentica­tion to ensure data protection.

2. Securing network and data Operating systems and security software should be updated automatica­lly to fix security flaws, so it is important that users never disregard update prompts, according to the bureau. Firewalls should also be set up as these act as a “gatekeeper for all incoming and outgoing traffic.” It would also be helpful for companies to turn on spam filters to reduce the amount of spam and phishing emails – a common tactic hackers use to infect devices and steal confidenti­al informatio­n – that their businesses receive.

3. Activate data encryption Encryption converts data into a secret code before it is sent over the internet, so it is vital for businesses to turn on network and data encryption when storing and sharing data. This can be activated through router settings or by installing a virtual private network (VPN) software on computers and other devices.

4. Use multi-factor authentica­tion Another standard practice to protect data is the use of multi-factor authentica­tion (MFA). This verificati­on process requires users to provide two or more proofs of their identities to access their accounts, adding another layer of security. One example is a system where a password and a code sent to a separate device are required before a user granted access to an online account.

5. Replace passwords with passphrase­s

Business.gov.au also recommende­d using passphrase­s instead of passwords, especially for accounts that hold important business informatio­n. A secure passphrase should be at least 14 characters long, and consists of a combinatio­n of upper and lower case

is letters, numbers, and special characters. It should also be unpredicta­ble – meaning the words are unrelated – and unique – meaning it is not used for other accounts. 6. Comprehens­ive monitoring system A business should keep a record of all the equipment and software it uses. It should remove sensitive informatio­n from any device and software that is no longer in use and disconnect these devices from its network. The bureau said older and unused equipment or software will unlikely be updated and may serve as a “backdoor targeted by criminals to attack businesses.” Similarly, organisati­ons should remove access from past employees and those who have changed roles and no longer require access.

7. Implement security policies Businesses should also have clear cybersecur­ity policies to guide employees on what is acceptable when sharing data, using computers and other devices, and accessing internet sites.

8. Cybersecur­ity training

Employees can be an organisati­on’s first and last line of defence against cyber threats, according to Business.gov. au. This is the reason why it is crucial to educate them on how to identify, avoid, and deal with a cyber threat.

9. Ensure customer protection

It is also vital for businesses to keep their clients’ private informatio­n safe. In line with this, they should be able to provide a secure online environmen­t where transactio­ns can take place.

10. Consider cyber insurance

A cyber insurance policy helps cover for the financial losses resulting from a cyberattac­k and, in an increasing­ly digital business environmen­t, it pays for companies to have one. Coverage can also include claims made by individual­s or groups that may have been harmed because of a business’s action or inaction.

 ?? Automating Telco ??
Automating Telco

Newspapers in English

Newspapers from Nigeria