It is estimated that up to 92 percent of malware is delivered to users via email—and given that the majority of businesses will use email to communicate both internally and externally, the list of people who could be affected by malware is endless.
Fortunately, the risk of malware and phishing attacks can be kept to a manageable level if everyone in a company takes responsibility for the company’s cyber security.
Data Security Best Practices
This list of best practices is an excellent starting point for any company looking to take control of its IT and data security.
Passwords
A password’s strength is determined by its length, complexity, and unpredictability. All three of these factors work together to determine how secure a password is; however, these factors do not eliminate the need for other critical security controls to ensure that passwords are not compromised.
Password Configuration – Data Security
Passwords should be sufficiently long in length to ensure security; aim for between 12 and 14 characters, with a mix of uppercase and lowercase characters. Adding special characters to your password will also help to strengthen it.
Email security
Most people dismiss the importance of email security. However, up to 80% of successful cyber attacks involve phishing- a common form of fraud in which individuals are asked to reveal personal information such as passwords, credit card information, and so on while claiming to be from a reputable business.
Attachments
Having strict procedures in place to ensure that employees understand the safe working practices for opening and sharing attachments via email will aid in the reduction of IT threats and malware.
Final Words:
Fortunately, taking control of your company’s IT security does not have to be difficult. Cegura Technologies can assist in providing solutions to combat workplace IT security. Learn more about how we can assist you in taking the necessary steps to protect your business from cyber threats. Contact us right away!