5 Ways to Protect Your Business from Hackers

In the 1830s Napoleon Bonaparte commissioned the Chappe’s telegraph network, a colossal chain of mechanical arms stretching across France and into Germany and Italy to be used solely for transmitting top secret military information using a form of semaphore. The network had only been in use for a year before brothers Francois and Louis Blanc bribed the system operators to transmit stock market information from Paris to Bordeaux where they lived ahead of other traders. This represented a major turning point in human civilisation. It’s was the world’s first hack. The moment where technology was, for the first time, manipulated by nefarious outside influences for their own gain.

Hacking has come a long way since then, but has never stopped presenting a threat to businesses. It’s no longer enough to simply set up a firewall and add a couple of numbers to your password. Data protection needs to be active and it needs to be uniform across an entire business. Gafencu looks at the five behaviours and techniques most recommended by security specialists to avoid cyber attacks.

hackers

Stay up to date

This not only means keeping your software current and changing your passwords often but also staying abreast of new ways hackers are using to infiltrate data networks. “White hat hackers” find and repair any gaps, which could leave you and your business vulnerable, before malevolent hackers can. Password management company SplashData releases an annual list of the worst passwords to have. Check and make sure yours isn’t one of them.

Limit access

It’s inadvisable to have your entire bank of data available to everyone in the company. Trainees and third-party maintenance operatives in particular should be restricted from accessing sensitive data or networks.

Educate your staff…

Hackers are increasingly preying on “low status” employees such as receptionists, secretaries and interns – essentially, people the boss may not be thinking about but who do have the power to, however accidentally, open you up to more serious threats. Make sure the all staff have an understanding of how to keep themselves and the company secure, especially if they deal with emails. 91% of advanced cyber attacks begin with opening a phishing email.

hackers

…and your children

As well as lower level staff nefarious hackers are also looking to the children of wealthy business owners as a weak point in their security, particularly if they use social media. Ensure that your children understand how to use social media safely and not to publicly associate themselves with your business.

hackers

Make a back-up plan

Sometimes the unthinkable happens. Knowing how to recognise a cyber attack and what to do afterwards can  make all the difference. Look out for unauthorised transactions, unwanted toolbars suddenly appearing in your browser or friends on social media receiving messages you didn’t send. Be aware that in many cases closing a browser window or clicking ‘cancel’ after opening a malware link does not do anything to stop the attack. Most importantly ensure that your data is regularly and safely backed up meaning it can be recovered if the worst should happen.

Text by: Alice Duncan

Phone Security: Is your phone really as protected as you think it is?

You can boost your phone security with a few simple steps
Boost your phone security and stay protected with these simple steps

With the advent of smartphone technology, everyone’s life can literally fit into the palm of one’s hand. Anything you want is right at your fingertips, be it shopping, watching movies, texting friends, or even online banking. But if you’re not careful, you can fall victim to a web of cybercrime like hacking, stolen identities and even outright theft. Boost your phone security with these three simple steps and keep your information safe.

Screen locks and passwords boost phone security

1) Set up a password-protected screen lock

Perhaps the most basic of phone security measures, a screen lock is the first step to dissuade sticky-fingered strangers from walking away with your phone. Set up a 30-second automatic screen lock and put in password protection measures. Don’t go for the 4-digit pin either, as that’s the easiest to crack. Opt for fingerprint scanning or a complex alphanumerical password.

Leaving bluetooth on is a phone security risk

2) Turn off Bluetooth and Wi-Fi when not in use

Dangers to phone security aren’t just limited to the physical world. Digital criminals can access your phone remotely through unsecured Wi-Fi and Bluetooth networks. Just think back to last year’s BlueBorne scare, when Internet security firm Armis revealed fatal flaws in Bluetooth coding that could have given attackers backdoor access to almost 5.3 billion devices worldwide. Similar problems have cropped up in Wi-Fi chip designs as well. So remember to switch off all Bluetooth and Wi-Fi functions when you’re not using them.

Only download verified apps to preserve phone security

3) Only download safe, verified apps

At the end of the day, your phone security is only as strong as the least secure app on your phone. Seemingly harmless games or other software could conceal malicious viruses and malware designed to steal your data without your knowledge. As a rule of thumb, only download programmes verified by Google Play Store or Apple App Store. Another good tip is to read user reviews before pressing ‘Install’.

Text: Tenzing Thondup