It's like the Wild Wild West out there. Check out these quick cyber security fixes.

Feb 21, 2022

It's like the Wild Wild West out there.

Don't be a cybercrime target! These quick cyber security tips offer simple ways to improve IT and safeguard your business against IT threats.

It's like the Wild Wild West out there

Did you know that the average ransomware attack on a business costs thousands of pounds to fix? Wait, what? You own or manage a business but don't know *exactly* what ransomware is, other than it sounds faintly cowboy-like? We hear you. But the thing is, you just can't ignore cybersecurity if you own any kind of business or organisation. Profit-making or non-profit-making, selling awesome products or terrible cologne, cybercriminals just don't care. They want your money. They want your data. They are ruthless - and they never stop working to attack business systems and make them pay.

You have to stay ahead of the game. And that means being prepared, strategic and almost as deviously clever as your average IT cybercriminals (who could be located anywhere in the world, sitting in a cafe, drinking good coffee and attacking your systems on their laptop without a care in the world!)

Don't be a sitting duck. Here are some simple ways to improve
IT security at your business, and to boost your cyber security credentials, with the tech equivalent of a moat and army.

1. Take your hardware inventory

Do you know those laptops that are sitting in the marketing cupboard, behind the flyers? Wait, you didn't? OK, it's time to do a thorough inventory of your
business hardware - from phones to desktops - and then get a process in place for managing, recording and updating it. Without that knowledge, you could have things disappearing left, right and centre and you'd never know!

2. Do the same with your software...

There are automated tools for doing this - they scan IP address ranges (aka, anything in your business) and analyse the traffic to see what software and devices are being used. This will tell you what you've got and what people are using (it could be enlightening) and then give you the info to keep on top of things. Chances are you'll want to get some pretty clear
software policies in place when you see how many employees are playing Tetris quietly when they're supposed to be updating that costing spreadsheet.

3. Get your configurations secure

Remove the 'crapware' from your machines, and any software that you don't need on your servers. It's spring cleaning time! Then ask yourself how many applications are needed on a machine for a staff member to do their job. Bin the rest! You need to be slim, agile and free from clutter - embrace the minimalist ethos and achieve software Zen with this 'rightsize' approach. From this point, you can get egress and ingress filtering in place, documenting all configurations and securing them. Yes, this sounds tremendously boring and it can be. So use an
IT consultant who finds it truly fascinating.

4. Defend your boundaries!

Like a vigilant Western cowboy defending his boundaries, you need to deploy blacklists, whitelists, configure outbound controls and get an IDS system in place. Ten-gallon hat and spurs optional.

5. Security Audit logging time

Those audit logs need to be in place. And when they are in place, you need to monitor them to know what's going on in your network and identify any unusual behaviour.

6. Get your application software security sorted

This is another easy one - use Web application firewalls and then application layer security installed to protect every business application from a range of attacks. Learn this phrase '
Multi Factor Authentication' (Click to learn more) as this will significantly boost your cyber security.

7. Think about your admin privileges

Not all of your staff need to be able to access everything. Some staff will need it all - but even they don't need to read Debbie in accounts emails, EVEN IF she has a lively and colourful life that's worth knowing more about. Make sure every user has different passwords and accounts for their non-admin and admin activities.

8. Passwords

YES WE KNOW that '
password!1' is easy to remember, but so do cybercriminals. And yes, there are default user names and passwords that save you so much time... but also, millions of pounds in stolen revenue every year right? Get a password protocol in place.

9. Have a clear data access policy

What data do you need to protect? Where exactly is it? Who needs to see it? How is it controlled?
You need a policy! That's great news. Everyone loves making a policy, right? If you don't, call in that IT consultant for a best practice model.

10. Upgrade your malware protection software

Work with your IT specialists to make sure your
malware detection software is completely up to date and best in class. These systems aren't even expensive, but they do need updating and deploying across your network. Smile nicely at the team with the tech skills and they'll keep the cybercrime at bay.

11. Delete leavers - fully

Has an employee dared to leave your business? Make them pay. Well, not really, but make sure they are fully excited using a clear process. You must recover the devices that they have assigned to them via your audit and then revoke all privileges and user access. For a sobering case study, consider every business that ended up with a disgruntled ex-employee going to town on their branded social media pages...

12. Train, train, train

You need to build an IT awareness and safety culture and keep on top of communications that show your staff how important this topic is. Start a fascinating debate about malware in the canteen. Gather staff around for a brew on a Friday morning and entrance them with tales of computer viruses. Failing that, implement a solid training, development, communications and monitoring strategy that ensures your people are always up to date and know what's expected of them.

Get the help you need

If you are looking for professionals who can help you improve your cybersecurity,
choose Yoozoom.

Yoozoom is the UK's leading specialist provider of business cloud systems. We offer a full range of services to businesses of all kinds and sizes, including our
GAP analysis that can help to find weaknesses in your hardware and software and help you to better understand the opportunities and threats your IT systems might face.

Contact us to find out more or
sign up to our mailing list for coffee-time newsletters that help you to run a better business. (No spam, we promise)

by Matthew Dickinson 21 Oct, 2024
We’re excited to announce that Yoozoom has officially joined the Windsor Telecom family as part of their mission to grow and expand across the UK. As a Leeds-based leader in unified communications, IT services, and networking solutions, Yoozoom has a proud legacy of helping businesses thrive. What does this mean for Yoozoom customers? Yoozoom will continue to provide the same high-quality services you know and trust. Windsor Telecom is committed to investing in our team and services, ensuring that we’re able to offer even more to our customers as part of a larger national network. A message from Windsor Telecom: "We’re thrilled to welcome the Yoozoom team and customers into the Windsor Telecom family,” said Pete Tomlinson, CEO of Windsor Telecom. “Their expertise will be invaluable as we grow our national presence, helping even more businesses use technology to deliver outstanding customer and employee experiences.” As part of Windsor Telecom’s UK-wide growth plan, Yoozoom is excited to embark on this next chapter and continue to deliver innovative solutions that make a difference. Stay tuned for more updates as we continue to evolve as part of the Windsor Telecom Group!
Small business owner? Need a new phone system? This is the guide for you.
by Simon Edward 26 Sept, 2022
Small business owner? Need a new phone system? This is the guide for you. Learn how to find a VoIP phone system that helps you smash your goals.
By 2025, all UK phone systems will be cloud-based.
by Simon Edward 19 Sept, 2022
By 2025, all UK phone systems will be cloud-based. If you're reluctant to switch sooner rather than later, read on for six advantages of a VoIP system.
Ten years ago, Skype was everywhere. Now… not so much. But what happened, exactly?
by Simon Edward 12 Sept, 2022
Ten years ago, Skype was everywhere. Now… not so much. But what happened, exactly? Read on to discover the truth behind Skype's rise and fall.
94% of all enterprises use cloud services – but do 94% know enough about cloud security?
by Simon Edward 05 Sept, 2022
94% of all enterprises use cloud services – but do 94% know enough about cloud security? Read on to find out more about staying safe in the cloud.
Do you even NEED two mobile phones for work?
by Simon Edward 22 Aug, 2022
Is it time to ditch the company mobile? We weigh up the pros and cons – and explore a third option that could save you cash and hassle.
Want to outsource IT support? Scratching your head over the options?
by Simon Edward 15 Aug, 2022
Want to outsource IT support? Scratching your head over the options? Choose the right IT company, first time, with our 5-step guide.
What is the true cost of an IT failure?
by Brian Rosten 08 Aug, 2022
IT failures cost more than you might think. Learn three ways to calculate the true cost of a failure and safeguard your business from tech disasters.
Time's running out – are you ready for BT's
by Simon Edward 02 Aug, 2022
In 2025, BT will switch off its ISDN and PSTN phone lines for good. Is your business ready for the change? Learn what's happening and what to do.
Learn 4 big reasons why phishing attacks work, as well as some useful tips to help you safeguard you
by Simon Edward 25 Jul, 2022
Phishing is on the rise. Learn 4 big reasons why phishing attacks work, as well as some useful tips to help you safeguard your business.
More posts
Share by: