Connect with us

Featured

Cyber essentials for SMEs

Published

on

As a small business owner, the last thing you need is an online security breach. That’s why it’s well worth getting the right security measures in place and reviewing them on a regular basis, writes PAUL MACPHERSON, Head of Security, Xero.

Most of us couldn’t get through the day without using the internet. Whether it’s helping us get to work or schedule plans with our family, one things certain – this access to the internet has massively transformed our lives for the better.

The same goes for small businesses, giving them access to a connected, global world and the ability to transact and operate with far greater efficiency. However, as more small businesses take advantage of the exciting opportunities that the internet offers, it’s crucial that cybersecurity is the number one priority.

According to security software company Norton, globally 689.4 million (31%) people were affected by cybercrime in the past year. What’s more 63% of people also believed it’s become more difficult to stay safe and secure online over the past 5 years. Criminals are getting smarter online – and small businesses, with often limited resources at their disposal, can be particularly vulnerable.

In many security breaches, cyber-criminals simply exploit insecure remote-access software, employee activity and weak password security to gain access. Hacking methods such as phishing and social engineering, as well as sophisticated malware are popular methods used to breach seemingly secure systems.

As a small business owner, the last thing you need is the consequences of an online security breach. That’s why it’s well worth getting the right security measures in place and reviewing them on a regular basis. Here are four focus areas that should be deployed immediately to safeguard your business from attack:

  • Choose the right security software, and don’t forget to update it

It pays to install reputable anti-malware software and regularly update it.  Malware often tries to exploit known vulnerabilities in software and this could seriously compromise your systems. Anti-malware will detect and stop most malicious software including computer viruses, worms, Trojan horses, ransomware, spyware, adware and scareware from entering your systems.

As well as keeping your anti-malware software up to date, you need to keep your operating system and application up to date with the latest security patches. It might seem obvious, but you’d be surprised at the number of businesses who don’t do this. Look at the recent WannaCry and NotPetya ransomware instances in which a known Microsoft SMB vulnerability was exploited which organisations should have patched.

  • Equip your employees with the right skills

Many scams and attacks rely on manipulating people to do something that gives hackers the information or access they’re after. Known as social engineering or phishing, these tactics include using personal information to earn trust from unsuspecting employees. All it takes is two seconds for you or one of your team to click on a link or attachment in an email, or enter a password on a fake login page, and you’ve let the criminal in.

No matter what industry your business operates in, you’ve got to educate every last member of staff – including yourself! There are easy-to-use online tutorials available that help train people in the dos and the don’ts when it comes to staying safe online.

  • Use 2SA

The 2SA or Two-Step Authentication is like putting an extra deadbolt on your front door. It involves two layers of security. First, enter your existing password and then input the verification code generated by an app on your smart device. This significantly reduces the risk of account takeover – the cybercriminal may get hold of your password but that’s not enough for them to gain access.

2SA (or 2FA, MFA or 2SV) is also an important security measure to protect your email account. An insecure inbox is incredibly risky; once hackers get hold of it, they’ll be able to reset all your passwords. A compromised business email account is often used for invoice fraud, by intercepting and changing the payment bank account numbers on invoices attached to emails as PDFs.

  • Enforce strict password protocol

The number of passwords most people have these days can be quite overwhelming. So it’s natural for you to pick something that is relatively easy to remember, but this can a dangerous move. A basic password is easy to hack – a dictionary attack can crack a basic code in a couple of seconds.

Make sure you reinforce just how important it is that everyone picks a robust password. Ask them to run it through a password checker to make sure they’re being as safe as possible. Rather than changing your passwords regularly (this can lead to bad password habits and predictable passwords), create a strong password from the get-go. This should include a mix of at least 12 characters of different types. Of course, if you suspect that your password has been compromised then change it immediately.

Using a different password for each login is also good practice. Having a unique password helps prevent a compromise of one login becoming a compromise of many. Consider installing a Password Manager to help generate strong, unique passwords for each site.

A small, agile business typically allows employees to access email or other business apps from their phones. If this is the case, ensure that your employees protect their phones with a password, PIN, or biometric (fingerprint) authentication. A mobile device manager (MDM) can enforce security policies and delete access to business data if the phone is lost or stolen.

Unfortunately, we are living in a world in which these online threats are only going to get more frequent and more sophisticated. Global research tells us that more than 50% of cyber attacks target small businesses. But, the measures you can take to combat these threats are also getting wiser. It might seem like a large commitment with not much ROI, but in the long run it could be the making or breaking of your company.

Featured

Now download a bank account

Absa has introduced an end-to-end account opening for new customers, through the Absa Banking App, which can be downloaded from the Android and Apple app stores. This follows the launch of the world first ChatBanking on WhatsApp service.

Published

on

This “download your account” feature enables new customers to Absa, to open a Cheque account, order their card and start transacting on the Absa Banking App, all within minutes, from anywhere and at any time, by downloading it from the App stores.

“Overall, this new capability is not only expected to enhance the customer’s digital experience, but we expect to leverage this in our branches, bringing digital experiences to the branch environment and making it easier for our customers to join and bank with us regardless of where they may be,” says Aupa Monyatsi, Managing Executive for Virtual Channels at Absa Retail & Business Banking.

“With this innovation comes the need to ensure that the security of our customers is at the heart of our digital experience, this is why the digital onboarding experience for this feature includes a high-quality facial matching check with the Department of Home Affairs to verify the customer’s identity, ensuring that we have the most up to date information of our clients. Security is supremely important for us.”

The new version of the Absa Banking App is now available in the Apple and Android App stores, and anyone with a South African ID can become an Absa customer, by following these simple steps:

  1. Download the Absa App
  2. Choose the account you would like to open
  3. Tell us who you are
  4. To keep you safe, we will verify your cell phone number
  5. Take a selfie, and we will do facial matching with the Department of Home Affairs to confirm you are who you say you are
  6. Tell us where you live
  7. Let us know what you do for a living and your income
  8. Click Apply.

 

Continue Reading

Featured

How we use phones to avoid human contact

A recent study by Kaspersky Lab has found that 75% of people pick up their connected device to avoid conversing with another human being.

Published

on

Connected devices are becoming essential to keeping people in contact with each other, but for many they are also a much-needed comfort blanket in a variety of social situations when they do not want to interact with others. A recent survey from Kaspersky Lab has confirmed this trend in behaviour after three-quarters of people (75%) admitted they use a device to pretend to be busy when they don’t want to talk to someone else, showing the importance of keeping connected devices protected under all circumstances. 

Imagine you’ve arrived at a bar and you’re waiting for your date. The bar is busy, and people are chatting all around you. What do you do now? Strike up a conversation with someone you don’t know? Grab your phone from your pocket or handbag until your date arrives to keep yourself busy? Why talk to humans or even make eye-contact with someone else when you can stare at your connected device instead?

The truth is, our use of devices is making it much easier to avoid small talk or even be polite to those around us, and new Kaspersky Lab research has found that 72% of people use one when they do not know what to do in a social situation. They are also the ‘go-to’ distraction for people even when they aren’t trying to look busy or avoid someone’s eye. 46% of people admit to using a device just to kill time every day and 44% use it as a daily distraction.

In addition to just being a distraction, devices are also a lifeline to those who would rather not talk directly to another person in day-to-day situations, to complete essential tasks. In fact, nearly a third (31%) of people would prefer to carry out tasks such as ordering a taxi or finding directions to where they need to go via a website and an app, because they find it an easier experience than speaking with another person.

Whether they are helping us avoid direct contact or filling a void in our daily lives, our constant reliance on devices has become a cause for panic when they become unusable. A third (34%) of people worry that they will not be able to entertain themselves if they cannot access a connected device. 12% are even concerned that they won’t be able to pretend to be busy if their device is out of action.

Dmitry Aleshin, VP for Product Marketing, Kaspersky Lab said, “The reliance on connected devices is impacting us in more ways than we could have ever expected. There is no doubt that being connected gives us the freedom to make modern life easier, but devices are also vital to help people get through different and difficult social situations. No matter what your ‘connection crutch’ is, it is essential to make sure your device is online and available when you need it most.”

To ensure your device lifeline is always there and in top health – no matter what the reason or situation – Kaspersky Security Cloud keeps your connection safe and secure:

·         I want to use my device while waiting for a friend – is it secure to access the bar’s Wi-Fi?

With Kaspersky Security Cloud, devices are protected against network threats, even if the user needs to use insecure public Wi-Fi hotspots. This is done through transferring data via an encrypted channel to ensure personal data safety, so users’ devices are protected on any connection.

·         Oh no! I’m bored but my phone’s battery is getting low – what am I going to do?

Users can track their battery level thanks to a countdown of how many minutes are left until their device shuts down in the Kaspersky Security Cloud interface. There is also a wide-range of portable power supplies available to keep device batteries charged while on-the-go.

·         I’ve lost my phone! How will I keep myself entertained now?

Should the unthinkable happen and you lose or have your phone stolen, Kaspersky Security Cloud can track and protect your device from data breaches, for complete peace of mind. Remote lock and locate features ensure your device remains secure until you are reunited.

 

Continue Reading

Trending

Copyright © 2018 World Wide Worx