Common vulnerabilities you can fix
Cyberattacks can be carried out in a number of different ways, and unfortunately, some of them cannot be known until after they’ve been successful.
Since many attackers make use of well-known vulnerabilities, there are steps you can take to protect your business against some more common attacks. To protect your business, here are some common vulnerabilities you can fix:
- Out of date software: Update software regularly. Set up automatic updates to ensure the latest security patches installed.
- Not having a firewall: Firewalls prevent unauthorized connections to your devices. Most operating systems will have a basic firewall application.
- Not using antivirus software: Installing anti-virus software and keeping it updated will ensure your computer is securely protected against malware.
- Not using a spam filter: Spam email is a common way for malware to spread. Spam filters will keep your inbox clear and will help protect your business against security threats and fraud.
- Not whitelisting applications: Many operating systems give the option of controlling what applications can run on your machine. Whitelisting software means giving your computer an explicit list of what programs may run and prevents unauthorized programs from running on your computer.
- Weak passwords or written down passwords: Having passwords that are easy to guess or are kept written down will negate many other security precautions. Use strong passwords that contain a mix of upper and lower case letters, numbers, and symbols.
- Storing sensitive information on publicly accessible drives: Access to storage devices can be controlled. Ensure only authorized persons have access to sensitive data.
- Unsecured Wi-Fi or other wireless connections: Observing good wireless security will prevent unauthorized access to your networks or devices.
- Unencrypted communications: Encrypting your communications will ensure only the intended recipient can read it. This is good practice when dealing with sensitive customer information.
- Unrestricted administrative privileges: Administrative privileges on a computer allow the user to control all settings and alter any information on a computer. This is appropriate for whoever is responsible for maintaining your systems but more restricted control for other users could be appropriate.
Taking these steps will do a lot to keep your business safe.
Beyond these vulnerabilities, your business can be made vulnerable by employees observing unsafe practices. Staff should be made aware of threats and be trained to follow basic security practices and privacy rules.