All the latest UK technology news, reviews and analysis


Top 10 security tips to protect your firm from cyber woes

15 Feb 2013

Since the start of the year security issues have dominated the news agenda with numerous Java exploits being uncovered, hacks on major institutions being revealed and even the ICO issuing its largest ever fine of £250,000 against Sony.

While law enforcement and tech giants like Microsoft are fighting back in the war on cyber criminals it's clear that throughout 2013 security will, as ever, be a headline topic.

This will cause headaches for businesses, as they try to defend their systems from attacks while also allowing staff to work productively and often with their own devices.

As such, V3 has put together a handy check list of 10 key issues to consider when assessing security requirements, to help you

10. If it seems too good to be true, it is

malware virus security threat scamIt's a life lesson that always bears repeating - if it seems too good to be true it is. So any email that claims you're owed a tax rebate, that you've won tickets to an event, or even inherited countless bazillions from a Nigerian prince you've never spoken too, should be binned immediately.

However, it's not enough to just look out for obvious-scams, as many email security attacks are now growing in sophistication, sometimes mimicking major organisations like Fedex to trick you into clicking on attachments or following links.

The bottom line is to always just think twice before you click or download: did you actually order a package recently, have you really applied for a tax rebate, and so forth, so that if anything strange does appear you don't just mindlessly click.

For those in IT, keeping an eye on these threats whenever they surface and reminding staff to be vigilant and sceptical about such scams is an easy but vital proactive approach to tackling this problem.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Dan Worth
About

Dan Worth is the news editor for V3 having first joined the site as a reporter in November 2009. He specialises in a raft of areas including fixed and mobile telecoms, data protection, social media and government IT. Before joining V3 Dan covered communications technology, data handling and resilience in the emergency services sector on the BAPCO Journal

View Dan's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus
Related jobs
Poll

Work location poll - office, remote or home?

Where do you spend most time working on your primary work device?
60%
4%
2%
0%
34%
0%

Popular Threads

Powered by Disqus
LG G Flex 2 hands-on review

CES 2015: LG G Flex 2 video

A closer look at LG's latest curved-screen smartphone

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
mubaloo2

Beacon technology: what are the opportunities and how does the technology work?

This paper seeks to provide education and technical insight to beacons, in addition to providing insight to Apple's iBeacon specification

ibmv3may

Converting big data and analytics insights into results

Successful leaders are infusing analytics throughout their organisations to drive smarter decisions, enable faster actions and optimise outcomes

Information Security Consultant, Reading £50-£60k

Information Security Consultant, Reading £50-£60k...

CRM System Officers

At the University of Derby, people are at the heart of...

Business Intelligence Analyst

Citywire is a global publishing company with offices...

HTML Email Developer

At the University of Derby, people are at the heart of...
To send to more than one email address, simply separate each address with a comma.