All the latest UK technology news, reviews and analysis

Top 10 security tips to protect your firm from cyber woes

15 Feb 2013

Since the start of the year security issues have dominated the news agenda with numerous Java exploits being uncovered, hacks on major institutions being revealed and even the ICO issuing its largest ever fine of £250,000 against Sony.

While law enforcement and tech giants like Microsoft are fighting back in the war on cyber criminals it's clear that throughout 2013 security will, as ever, be a headline topic.

This will cause headaches for businesses, as they try to defend their systems from attacks while also allowing staff to work productively and often with their own devices.

As such, V3 has put together a handy check list of 10 key issues to consider when assessing security requirements, to help you

10. If it seems too good to be true, it is

malware virus security threat scamIt's a life lesson that always bears repeating - if it seems too good to be true it is. So any email that claims you're owed a tax rebate, that you've won tickets to an event, or even inherited countless bazillions from a Nigerian prince you've never spoken too, should be binned immediately.

However, it's not enough to just look out for obvious-scams, as many email security attacks are now growing in sophistication, sometimes mimicking major organisations like Fedex to trick you into clicking on attachments or following links.

The bottom line is to always just think twice before you click or download: did you actually order a package recently, have you really applied for a tax rebate, and so forth, so that if anything strange does appear you don't just mindlessly click.

For those in IT, keeping an eye on these threats whenever they surface and reminding staff to be vigilant and sceptical about such scams is an easy but vital proactive approach to tackling this problem.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Dan Worth

Dan Worth is the news editor for V3 having first joined the site as a reporter in November 2009. He specialises in a raft of areas including fixed and mobile telecoms, data protection, social media and government IT. Before joining V3 Dan covered communications technology, data handling and resilience in the emergency services sector on the BAPCO Journal

View Dan's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus

Devices at work poll

Which device do you use most for work?

Popular Threads

Powered by Disqus
LG G Flex 2 hands-on review

CES 2015: LG G Flex 2 video

A closer look at LG's latest curved-screen smartphone

Updating your subscription status Loading

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button

Getting started with virtualisation

Virtualisation can help you reduce costs, improve application availability, and simplify IT
management. However, getting started can be challenging


Converting big data and analytics insights into results

Successful leaders are infusing analytics throughout their organisations to drive smarter decisions, enable faster actions and optimise outcomes

PPC Manager - Leading Paid Search Agency - Manchester

PPC Manager - Leading Paid Search Agency - Manchester...

Lead Solutions Architect - Yorkshire

Lead Solutions Architect - Yorkshire Solutions Architect...

Junior Software Developer - Web / C# / ASP.Net / HTML / CSS

Junior Software Developer - Web / C# / ASP.Net / HTML...

Junior PHP Developer - PHP / MySQL / HTML / CSS

Junior PHP Developer - PHP / MySQL / HTML / CSS Leading...
To send to more than one email address, simply separate each address with a comma.