All the latest UK technology news, reviews and analysis


Top 10 security tips to protect your firm from cyber woes

15 Feb 2013

Since the start of the year security issues have dominated the news agenda with numerous Java exploits being uncovered, hacks on major institutions being revealed and even the ICO issuing its largest ever fine of £250,000 against Sony.

While law enforcement and tech giants like Microsoft are fighting back in the war on cyber criminals it's clear that throughout 2013 security will, as ever, be a headline topic.

This will cause headaches for businesses, as they try to defend their systems from attacks while also allowing staff to work productively and often with their own devices.

As such, V3 has put together a handy check list of 10 key issues to consider when assessing security requirements, to help you

10. If it seems too good to be true, it is

malware virus security threat scamIt's a life lesson that always bears repeating - if it seems too good to be true it is. So any email that claims you're owed a tax rebate, that you've won tickets to an event, or even inherited countless bazillions from a Nigerian prince you've never spoken too, should be binned immediately.

However, it's not enough to just look out for obvious-scams, as many email security attacks are now growing in sophistication, sometimes mimicking major organisations like Fedex to trick you into clicking on attachments or following links.

The bottom line is to always just think twice before you click or download: did you actually order a package recently, have you really applied for a tax rebate, and so forth, so that if anything strange does appear you don't just mindlessly click.

For those in IT, keeping an eye on these threats whenever they surface and reminding staff to be vigilant and sceptical about such scams is an easy but vital proactive approach to tackling this problem.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Dan Worth
About

Dan Worth is the news editor for V3 having first joined the site as a reporter in November 2009. He specialises in a raft of areas including fixed and mobile telecoms, data protection, social media and government IT. Before joining V3 Dan covered communications technology, data handling and resilience in the emergency services sector on the BAPCO Journal

View Dan's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus
Poll

BYOD vs CYOD vs BYOC poll

Which approach is your firm taking to managing employees' mobile devices?
20%
14%
4%
20%
30%
12%

Popular Threads

Powered by Disqus
Galaxy S5 vs Xperia Z2 home screen

Xperia Z2 vs Galaxy S5

We break down the strengths and weaknesses of the two Android heavyweights

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
hpv33

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery

rdc2

iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

Software Development Engineer

Develop: Customise: Configure. Maximise your technical...

Junior Developer Hedge Fund C# WPF .Net - London

Junior Developer C# .Net - Mayfair Hedge Fund Junior...

IT Database Administrator (SQL)

Say hello to big brands & bigger career opportunities...

Magento Developer

Tile Mountain is a one stop online shop for all your...
To send to more than one email address, simply separate each address with a comma.