All the latest UK technology news, reviews and analysis

Top 10 security tips to protect your firm from cyber woes

15 Feb 2013

Since the start of the year security issues have dominated the news agenda with numerous Java exploits being uncovered, hacks on major institutions being revealed and even the ICO issuing its largest ever fine of £250,000 against Sony.

While law enforcement and tech giants like Microsoft are fighting back in the war on cyber criminals it's clear that throughout 2013 security will, as ever, be a headline topic.

This will cause headaches for businesses, as they try to defend their systems from attacks while also allowing staff to work productively and often with their own devices.

As such, V3 has put together a handy check list of 10 key issues to consider when assessing security requirements, to help you

10. If it seems too good to be true, it is

malware virus security threat scamIt's a life lesson that always bears repeating - if it seems too good to be true it is. So any email that claims you're owed a tax rebate, that you've won tickets to an event, or even inherited countless bazillions from a Nigerian prince you've never spoken too, should be binned immediately.

However, it's not enough to just look out for obvious-scams, as many email security attacks are now growing in sophistication, sometimes mimicking major organisations like Fedex to trick you into clicking on attachments or following links.

The bottom line is to always just think twice before you click or download: did you actually order a package recently, have you really applied for a tax rebate, and so forth, so that if anything strange does appear you don't just mindlessly click.

For those in IT, keeping an eye on these threats whenever they surface and reminding staff to be vigilant and sceptical about such scams is an easy but vital proactive approach to tackling this problem.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Dan Worth

Dan Worth is the news editor for V3 having first joined the site as a reporter in November 2009. He specialises in a raft of areas including fixed and mobile telecoms, data protection, social media and government IT. Before joining V3 Dan covered communications technology, data handling and resilience in the emergency services sector on the BAPCO Journal

View Dan's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus

Tech gifts for Christmas 2014

Is a new tablet on your wish list this festive season, or have they become yesterday’s fad?

Popular Threads

Powered by Disqus
iPhone 6 is available in silver gold and space grey

iPhone 6 video review

The best iOS handset to date

Updating your subscription status Loading

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button

Getting started with virtualisation

Virtualisation can help you reduce costs, improve application availability, and simplify IT
management. However, getting started can be challenging


Converting big data and analytics insights into results

Successful leaders are infusing analytics throughout their organisations to drive smarter decisions, enable faster actions and optimise outcomes

IT Technical Support Analyst

Job purpose : To provide IT support, troubleshooting...

Customer Engineer

Customer Engineer Job Description: Perform...

Network Support Officer


Data Analyst – MySQL and Excel, Visual Basic Environment

Are you a recent Maths, Physics or computer science graduate...
To send to more than one email address, simply separate each address with a comma.