Keeping your business safe online
Businesses throughout the world spend vast amounts of time each day on the internet whether this is as a way to sell products or through emails and a way to market the company. There are some important steps that need to be taken in order to ensure that your company is protected against any online attacks. Having an IT Support Cheltenham company to help ensure your systems are running smoothly is another way to identify any potential risk areas.
Here are some of the steps that you can take in your business.
- Posting online
When posting online, particular on social media accounts it is important that you ensure that you are not posting any personal information about yourself or your business that could be used to clone your identity or identify when you may or may not be in your property. In terms of your business this means not announcing when your entire staff team are out on a team building day, leaving your office vulnerable.
- Data, data, data
Not only are you responsible for ensuring that any data you have about your own business is kept safe and secure but you also need to protect any data that you hold on any of clients and customers. As a part of the new GDPR policies you should ensure that you have a data risk assessment completed identifying the types of data that you hold along with their risk level to your business and others should they be accessed in any way. This also includes ensuring that your data is backed up regularly.
- Authentication methods
When it comes to logging in to different systems and databases it is important to make sure that you use all of the authentication methods that are available to you. This includes logging into platforms such as Google and social media platforms. Two step authentication should be a minimum as this ensures that if someone gains access to your login details they won’t be able to access your system if they do not also have your mobile phone in their hands.
We are continually being told to ensure that are passwords are strong as this is one of the main ways in which people gain access to systems. Weak passwords or those that are repeatedly used are easier to hack as they are being used across multiple platforms. Any password should consist of a mixture of capital and lowercase letters, numbers and special characters.