All the latest UK technology news, reviews and analysis


Top 10 security tips to protect your firm from cyber woes

15 Feb 2013

Since the start of the year security issues have dominated the news agenda with numerous Java exploits being uncovered, hacks on major institutions being revealed and even the ICO issuing its largest ever fine of £250,000 against Sony.

While law enforcement and tech giants like Microsoft are fighting back in the war on cyber criminals it's clear that throughout 2013 security will, as ever, be a headline topic.

This will cause headaches for businesses, as they try to defend their systems from attacks while also allowing staff to work productively and often with their own devices.

As such, V3 has put together a handy check list of 10 key issues to consider when assessing security requirements, to help you

10. If it seems too good to be true, it is

malware virus security threat scamIt's a life lesson that always bears repeating - if it seems too good to be true it is. So any email that claims you're owed a tax rebate, that you've won tickets to an event, or even inherited countless bazillions from a Nigerian prince you've never spoken too, should be binned immediately.

However, it's not enough to just look out for obvious-scams, as many email security attacks are now growing in sophistication, sometimes mimicking major organisations like Fedex to trick you into clicking on attachments or following links.

The bottom line is to always just think twice before you click or download: did you actually order a package recently, have you really applied for a tax rebate, and so forth, so that if anything strange does appear you don't just mindlessly click.

For those in IT, keeping an eye on these threats whenever they surface and reminding staff to be vigilant and sceptical about such scams is an easy but vital proactive approach to tackling this problem.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Dan Worth
About

Dan Worth is the news editor for V3 having first joined the site as a reporter in November 2009. He specialises in a raft of areas including fixed and mobile telecoms, data protection, social media and government IT. Before joining V3 Dan covered communications technology, data handling and resilience in the emergency services sector on the BAPCO Journal

View Dan's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus
Poll

Microsoft Azure outage

Is cloud computing reliable enough for business yet?
9%
8%
21%
62%

Popular Threads

Powered by Disqus
Samsung Galaxy S5 hands on review home screen

MWC: Samsung Galaxy S5 video demo

We check out the key features of Samsung's rugged KitKat handset

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
hpv3may

Getting started with virtualisation

Virtualisation can help you reduce costs, improve application availability, and simplify IT
management. However, getting started can be challenging

ibmv3may

Converting big data and analytics insights into results

Successful leaders are infusing analytics throughout their organisations to drive smarter decisions, enable faster actions and optimise outcomes

C# Developer with curiosity for new tech - Node.js cross training £85K

This is one of the very few roles in Silicon Roundabout...

Node.js Contractor - 3 or 6 months rolling £550 per day, Old St

This highly trafficked and fantastically profitable website...

Space Planning Assistant

Central London (Regent campus) Fixed Term until...

Delivery Manager, (smilar to Project Manager) high traffic web brand

We are a highly trafficked (15M+ unique users per month...
To send to more than one email address, simply separate each address with a comma.