[fusion_builder_container hundred_percent="no" equal_height_columns="no" menu_anchor hide_on_mobile="small-visibility,medium-visibility,large-visibility" class id background_color background_image background_position="center center" background_repeat="no-repeat" fade="no" background_parallax="none" parallax_speed="0.3" video_mp4 video_webm video_ogv video_url video_aspect_ratio="16:9" video_loop="yes" video_mute="yes" overlay_color video_preview_image border_color border_style="solid" padding_top padding_bottom padding_left padding_right type="legacy"][fusion_builder_row][fusion_builder_column type="1_2" layout="1_1" background_position="left top" background_color border_color border_style="solid" border_position="all" spacing="yes" background_image background_repeat="no-repeat" padding_top padding_right padding_bottom padding_left margin_top="0px" margin_bottom="0px" class id animation_type animation_speed="0.3" animation_direction="left" hide_on_mobile="small-visibility,medium-visibility,large-visibility" center_content="no" last="false" min_height hover_type="none" link border_sizes_top border_sizes_bottom border_sizes_left border_sizes_right first="true" spacing_right="2%"][fusion_text columns column_min_width column_spacing rule_style="default" rule_size rule_color hide_on_mobile="small-visibility,medium-visibility,large-visibility" class id animation_type animation_direction="left" animation_speed="0.3" animation_offset]
Every employee shares one inescapable flaw that is putting your business at risk.They’re human.
59% of data breaches can be traced back to something an employee did (or didn’t do), which invited a cyber-attack.
To lock hackers out, build security awareness and respect into your company culture, so that maintaining digital security becomes as routine as making coffee.
Use complex passwords: Every employee, including management, needs to use an alphanumeric password that they haven’t used before. Password managers can assist with making sure they’re never forgotten.
Verify unknown identities: Not familiar with ‘Jenny from Accounting’ who has called to ask for sensitive information? Double check caller identity and access permissions before releasing any information. Hackers love to play on our desire to be helpful.
Encrypt by default: People regularly transfer data to a laptop or smartphone so they can work more efficiently. Unfortunately, this equipment can be easily stolen. Set operating systems to encrypt data by default, so that it becomes useless in the wrong hands.
[/fusion_text][/fusion_builder_column][fusion_builder_column type="1_2" layout="1_1" background_position="left top" background_color border_color border_style="solid" border_position="all" spacing="yes" background_image background_repeat="no-repeat" padding_top padding_right padding_bottom padding_left margin_top="0px" margin_bottom="0px" class id animation_type animation_speed="0.3" animation_direction="left" hide_on_mobile="small-visibility,medium-visibility,large-visibility" center_content="no" last="true" min_height hover_type="none" link border_sizes_top border_sizes_bottom border_sizes_left border_sizes_right first="false" spacing_left="2%"][fusion_text columns column_min_width column_spacing rule_style="default" rule_size rule_color hide_on_mobile="small-visibility,medium-visibility,large-visibility" class id animation_type animation_direction="left" animation_speed="0.3" animation_offset]
Protect portable devices: Laptops and mobile phones should always require a password and be set to auto-lock after a short period of time. Never leave them unattended in cars, buses, restrooms etc, and take them as carry-on luggage.
Set personal usage rules: While you may have blocked productivity-vacuums such as Facebook, what are the rules regarding games, video streaming or shopping? Can they install their own software? When business computers are used for personal usage, security vigilance tends to slide, resulting in unintentional malware installation.
Educate often: Digital security threats change regularly, and people become comfortable with a certain level of danger, thinking ‘it will never happen to me’. A 5-minute discussion once a month may be the barrier that keeps hackers out.
Starter Topics:Links in emails – Hackers often send emails that look like they are from your bank or similar. Be sure to check the link by hovering over it with your mouse. This is known as ‘phishing’.
Tech scam popups – Be on the lookout for popups advising that your computer is infected and you need to call a phone number or download software.
Email attachments – Never open an unknown attachment, and even from people you know and trust, always scan for malware before opening.
If you need help implementing better security practices in your business, call us on 1300 638 326.
[/fusion_text][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container]