Cyber Security Checklist

Cyber Security Checklist

Significantly reduce the chances of your business becoming a victim of cybercrime.

Cyber Security can be a daunting challenge and potentially costly process. But it doesn't have to be if you take these simple steps to protect your business.

If you're new to cybersecurity, you might not know where to start and know how to identify threats and vulnerabilities.

Or you might be overwhelmed by the number of potential threats out there. But don't worry. We'll look at the two primary methods of cybersecurity, the human element and the technical element. Then we'll look at the various types of threats you face such as phishing scams, social engineering attacks, malware and ransomware, data breaches and much more.

Get Started, Ask for an Invite

Cyber Security Checklist

This simple checklist can significantly reduce the chances of your business becoming a victim of cybercrime. It isn't a guarantee of protection, but it can help guide you to things you can do to help your small business not fall foul of attacks.

How to improve cyber security protection your business from all types of cyber attacks. Malware, phishing attacks and password penetration.

Cyber Security Checklist

Reduce chances of becoming a victim of cybercrime.
Unique Passwords

Use a unique password for every account don't use the same password everywhere. If the username and password combinations are the same, it leaves you very vulnerable.

If employees create their own password 50% use the same passwords at both work as well as their personal accounts at home.

Strong Passwords

Strong passwords are an easy and effective way to prevent unauthorised users from accessing your devices and software.

Create passwords including numbers, capitals and random characters, but don't use easy-to-recognise patterns 123456, qwerty and definitely not "password" as it is still one of the most used. Also always make passwords at least 12 characters long.

Use a password generator tool which can create long, more complex, unguessable passwords with a combination of letters, numbers, and more unusual special characters.

MFA Multifactor Authentication

MFA offers an additional layer of security by verifying that you are you. Additional Authentication using one-time passcode or the use of your fingerprint, to protect against hackers.

Password Manager

A safe secure place to manage your passwords. It offers a place to store passwords, generate more secure passwords, and updates passwords as you change them. e.g 1password.

Data Breaches

Regularly check if your email address or phone number has been compromised. Have I Been Pwned allows you to search multiple data breaches for your details.

Backing Up Data

Think about critical data, like customer details, quotes, orders, and payment details. How long you would be able to operate without them?

Protection from Malware

Malicious software (malware) is software or web content that can harm your business.

Malware are viruses, which are self-copying programs that infect legitimate software.

Protect Against Phishing Attacks

Phishing is when scammers send fake emails asking for sensitive information like bank details, or links that take you to fake websites.

Protect Phones, Laptops & Tablets

Keep your mobile phone security up to date and other devices and the important information stored on them secure.

Business Cyber Security

This checklist will give you some quick tips for protecting your business from cybercriminals. It will also show you how to keep your network safe so that your business stays in business.

The first step is to identify your risk. When it comes to cybersecurity, there are three main risks:

Data breaches - Data breaches can happen through human error, malware, or hacking.
Malicious software - Malicious software is typically ransomware that locks up your computers or your files and then demands money to release them.
Insider attacks - Insider attacks are typically more targeted, and hackers exploit weak points in your systems to gain access.

Once you've identified the risk, you need to determine what to do about it. How do you identify where the risk is? It's not always easy, but a good place to start is with your company's security policies. Do you have a policy on employee background checks? What about password complexity? If you don't have a policy, write one and make sure it's enforced.

Also, consider the role of social media in your business. Do you use Facebook for customer service?

Are your employees using your internet to post on social media like LinkedIn, Facebook or Instagram? Are they posting pictures of themselves on Twitter? Do you allow your employees to bring their personal devices to work? Think about creating a network security policy.

What about the risk to customers? If you're selling to businesses, is there a way that customers' information and data could be stolen? How are your customers protected? Are they physically secured or just digitally? Do they use encrypted files? What about employees' access to customer data? Is there a policy on protecting customer data?

How is it monitored? What about your own data? Do you have a policy for that? Do you store it in the cloud? If so, are you sure you have adequate security? If you don't have a policy or know how to implement one, you need to find out.