Cyber security tips

Cyber Security Tip 1: Remember, It Could Happen To You!

The first and most important of our cyber security tips is to never assume you won’t be a target. Smaller companies will often have the mindset that their data isn’t important enough to be hacked. Small-to-medium businesses are attractive victims to hackers, as they typically won’t have the same level of defenses as larger companies.




If your company has money or data, it has a bullseye on it just as large as any other company. This data includes passwords, client information, sensitive email threads, etc. Thinking it’ll never happen to me makes you complacent and likely to drop your guard. Always assume you are a target, and that the internet trolls are out to get you. Take the time to know and understand your assets (where a breach is most likely to occur). You can even perform threat-modelling exercises and put practical protection measures in place.

Cyber Security Tip 2: Practice Good Password Management

Strong, lengthy, random passwords with various character types, including upper and lowercase letters, drastically reduce the likelihood of your password being guessed. Refrain from using the same password for multiple sites and accounts, even if it’s a complex password. Also refrain from ever sharing your password with anyone, including a family member or close friend. Consider using a password management system, like LastPass. This password manager should be used in lieu of writing complex passwords on a post-it note or in your notepad.

Also use two-factor authentication (2FA) wherever possible, especially on internet-facing systems. 2FA can do wonders for your business’s cyber security. Even if a hacker has a password, they won’t obtain access to an account as a second level of identification is required. Ensure your employees follow the same protocols. The IT team ― internal or external ― should set up the password manager and 2FA on staff desktops and any other devices they use for work, including BYOD (bring your own device). This will ensure that, even if an employee has a weak or reused password, it won’t jeopardise company data. Periodically updating your passwords, at least every six months, is also a necessary measure to take to practice good password measurement.

Cyber Security Tip 3: Practice Sensible Internet Browsing (AKA Don’t Click the Dodgy Links!)

Be aware of safe sites and links, learn to recognise phishing attempts in emails (basically never click the link!), and ensure your employees practice safe browsing, too. Simple things like don’t share your password online should be reiterated. Employers and employee’s should be suspicious of potential malware at all times, as opposed to only considering the presence of malware when there are obvious signs.

Always remember to be careful what you click. Harmful links may appear via email, as pop-ups, or as unexpected attachments. Never let your employees freely download software onto their work computer. This could lead to downloading software from untrusted sources that host malware, compromising the device without anyone realising it’s happening.

Cyber Security Tip 4: Enable System Access Only As Required

You should regularly evaluate system access and ensure staff only have access to the data or networks required for their job. Wherever there is staff turnover, ensure their access is removed and be sure to require two-factor authentication for said access. Mobile application management will ensure that previous employees will not be able to access company data and accounts on their BYOD after they have left the business.

A good rule to follow is to only allow staff the minimum amount of access they need, never the maximum. Also don’t allow for blanket access across teams or departments, unless every member needs it to do their job. Make sure that you restrict administrative privileges, just giving them to the minimum amount of people you need to. User accounts with these privileges are attractive targets for cybercrime, as they hold a high level of system access. Minimising privileges makes it more difficult for an adversary to spread or hide their existence.

Cyber Security Tip 5: Be Wary of External Devices

With a culture of BYOD becoming more prevalent, be sure you’re screening all devices before they connect to your network. Laptops, mobiles, and USB flash drives can all carry malware and infect your system. Consider mobile device management or mobile application management to ensure your employees can only access company data on secure networks. This will also allow company apps and data to be remotely wiped if the device is compromised.

This is true for company-owned devices, too. Corporate mobile devices, whether it be a laptop, mobile, or tablet, contain locally-saved sensitive data and are connected to the company’s internal network through VPNs and workspace browsers. This can give the attacker to obtain direct access to the business if security measures are not in place. Think of mobile devices as an extension of the network perimeter, but easier to lose or steal. 

Cyber Security Tip 6: Back It Up

Back up all your networks and systems at regular intervals, whether it’s to a cloud-based server, or a physical one. This should be standard practice anyway, but ensure your incident response plan includes it, too, in case things go awry. You should always store the backup data separate from the main server.

If there is a cyber attack, you might have to completely wipe a device or server. This is particularly seen in ransomware cases, which are on the rise. If you store backups offline and in multiple locations, infected systems won’t be able to access it. If a breach occurred, regularly perform tests to ensure that an infected system cannot access to your data. Also make sure you regularly test that backups are being done correctly and that your data restoration procedures are effective.

Cyber Security Tip 7:  Ensure All Systems are Patched and Up To Date

Always keep your systems securely figured and updated. Device and software manufacturers release software patches to correct flaws in the software’s previous version, which includes cyber security vulnerabilities. Under the same premises, installing the latest software updates is equally as important and as easy to do. Leaving your system on older versions increases your likelihood of being exploited for weaknesses.

Insecurely configured environments let your system become an easy target for malicious activity, as it’s easier to obtain unauthorised access. Installing the latest patches and updates on your devices is an important habit to get into. You can do this through scheduling update checks, turning on automatic updates, and using web browsers (such as Chrome) that receive frequent, automatic security updates.

Cyber Security Tip 8: Monitor and Test your Networks

By constantly monitoring and testing your networks and devices, you’ll be the first to notice any suspicious activity. If something seems out of the ordinary, it could be a sign that the system has been compromised. Be involved and understand how activity should normally look so you immediately notice red flags pertaining to potential attacks. You should think about how putting a Security Operations Centre (SOC) to act as ‘virtual security guards’ can help effectively prevent, detect, and respond to a malicious attack.

You should also make sure that penetration tests and vulnerability assessments are conducted. They’ll detect any infrastructure weaknesses that could result in system vulnerabilities. If you have SOC in place, these results can be used to determine your detection and response capabilities.

Cyber Security Tip 9: Use Technology and Education to Defend Against Malware

Preventative measures are, of course, the best way to stop a cyber attack from happening altogether. They can save your company a lot of time and money! Aim for your business to have defenses that make it harder for a malware attack to infiltrate your system. Measures should also be in place so that an attack can get isolated. This means if one computer gets infected the malware is blocked from spreading.

There are a range of precautions that can be taken ― email security, firewalls, and ad- and script-blockers can block malicious senders and attachments. A firewall is a software- or hardware-based application that will prevent malicious attacks from various types of malware, such as hackers, worms, ransomware, and viruses that try to steal information. A crucial way of defending against malware is to educate and train your employees. That way, the initial downloading and execution of ransomware, malware, and phishing links will be prevented. In our cyber security services, Stanfield IT offer staff training so they are confident in their own cyber security knowledge and the preventative measures to take.

Cyber Security Tip 10: Follow The Essential Eight

ACSC’s Essential Eight strategies are recommended by the Attorney General’s Department. Implementing the strategies relevant to your company is a great step to mitigate cyber threats. Other frameworks and strategies are also effective, which we delve into in our blog covering The 7 Most Common IT Security Framework Options in Australia.

Of these, The Essential Eight are the most practical starting point for businesses to improve their cyber resilience. They comprise of eight mitigation strategies that act as a baseline of protection against cyber security threats. These eight strategies cover: application whitelisting, patching applications, configuring macro settings, user application hardening, restricting administrative privileges, patching operating systems, multi-factor authentication, and daily backups. The Essential Eight are designed so that they’re customisable to your business’s risk profile and the adversaries that are of the most threat to your business.


#cybersecurity #hacking #security #technology #hacker #infosec #tech #ethicalhacking #programming #linux #hackers #cyber #kalilinux #cybercrime #malware #python #privacy #it #iot #cyberattack #coding #dataprotection #hack #ethicalhacker #networking #informationsecurity #cybersecurityawareness #programmer #datasecurity #itsecurity #informationtechnology #software #business #cloud #computerscience #computer #internet #cloudcomputing #network #windows #bhfyp #data #phishing #hacked #cybersecuritytraining #coder #ai #artificialintelligence #cisco #anonymous #code #ransomware #encryption #networksecurity #java #digital #training #bigdata #machinelearning

OP: StanfieldIT

  • Facebook
  • Instagram
  • LinkedIn
  • Twitter
927 Beaufort Street, Mt Lawley,
Perth 6052
836/585 Little Collins Street,
Melbourne, 3000

Digital Marketing Agency Perth - Perth Digital Agency at your service. If you want your business to dominate the online world, you need to align yourself with a digital marketing agency that is not just following the latest trends but also creating them. Perth Digital Marketing is ridiculously competitive, so if you want your business to do more than just survive, you need to choose a marketing agency that is going to offer both proven strategies and outside the box thinking. At Vissi, we pride ourselves in offering revolutionary and proven strategies to help your business thrive and grow in the competitive online market. We work alongside your business every step of the way and ensure that you have the right tools you need to increase your profits and maximise your investment. We are experts in helping your business to find an endless line of customers that are ready and willing to spend on your products and services, using our clever and unrivalled marketing and conversion techniques. These techniques work almost instantly, which means that you don’t have to wait years to see growth or profits flowing in. In fact, most of the businesses that we work with begin to achieve their desired results in just a few months. How do we do it? It is our unwavering approach, dedication and out of the box thinking that has made us one of the premier digital agencies Perth. So, when it comes to selecting a digital marketing agency that is going to propel your business to new heights, don’t just take our word for it. Why not contact us today and see what we can do to help your business? Digital Marketing in Perth - Vissi started from humble beginnings in Perth and has quickly grown to become one of the top digital marketing agencies in the Perth digital agency scene.  Located in the Perth CBD, our digital agency caters to businesses both big and small in all areas of the city and beyond. By growing our business from the ground up in Perth, we know exactly what it takes to appeal to local audiences and how to navigate through the ever-evolving culture and economy of the city. We also pride ourselves on being able to offer Perth business owners some of the top proven marketing strategies that are breaking ground locally and all over the world. These strategies including helping your business to rank higher in search results and turning your traffic into leads that actually convert into paying customers.  In fact, we have helped brands increase profits by nearly ten times as much, all by following some of our proven methods. Whether you are a brick and mortar business or based solely online, Vissi is dedicated to helping you grow your business into a thriving profit machine, so you can spend more time doing the things you love and less time worrying about your business.

Perth Digital Marketing - Even though Vissi first started in Perth, we are quickly developing an extensive database of clients across Western Australia. We have worked with some of the biggest brands based out of Perth and have a strong track record in the area. But really, working with Vissi is super easy no matter where you live. We have a dedicated team that will help you every step of the way and ensure that your business is set up not just for short-term results, but for long-term success as well. After just a few short months of working with us, you will start to see your business growing rapidly. Your conversion rates will be up; your sales will be up, and of course, your profits will also be up. Guaranteed. Vissi is also one of the only digital marketing agencies out there that offer guaranteed results. We don’t do this as a desperate sales tactic, we do this because we stand by what we do 100%. Real Estate Digital Marketing - Digital Marketing for Real Estate Agents - Perth Digital Agency - Digital Marketing Agency Perth - Web Design Perth - Perth Web Design - SEO Agency Perth - SEO Perth - SEO in Perth - Perth SEO Agency - Perth web design - Ecommerce web design Perth - IT support Perth - IT Services Perth - Managed IT Perth  - Perth hosting – Busselton Digital Agency – South West Digital Agency – Digital Agency in Busselton

© 2020 VissiCon. Proudly designed and developed by VissiCon. Please review our TERMS & CONDITIONS and PRIVACY POLICY.