Begin Creating a Culture of Cybersecurity with These Four Tactics

Security, Insights

Ransomware, data breaches, account compromise, phishing, and malware are on the minds of most business leaders. As many as 76% of Irish organisations state they have some level of worry about employees exposing them to digital security risks.

In today’s hybrid working world, the risk can be even greater. Employees working remotely may not have properly secured devices. There may also be data exposure issues due to lax cybersecurity hygiene.

Here are some examples of how employees play a role in data breaches:

  • Neglecting to properly secure devices
  • Using weak passwords
  • Falling for a phishing email and providing a “user assist” to a breach
  • Mishandling personally identifiable information
  • Sharing passwords with others
  • Not keeping software updated on their devices

Begin Creating a Culture of Cybersecurity with These Four Tactics

Cybersecurity Awareness Month this year strongly emphasised these four main tactics to boost individual and company security. They may seem simple, but they are powerful, especially when used together.

These four tactics are also something everyone can do to improve cybersecurity at their home and office.

Enable Multi-Factor Authentication on All Accounts

Multi-factor authentication (MFA) involves enabling a secondary form of authentication before one can gain access to an account. Once the user enters their username and password, the next factor is requested.

This usually comes in the form of a one-time passcode (OTP) that is sent to a pre-registered device owned by the user. Once that code is entered, the user gains access.

Too many organisations don’t have MFA implemented because they find it inconvenient. Yet, it’s one of the most effective forms of protection against password compromise. According to Microsoft, MFA can block 99.9% of malicious sign-in attempts.

Enabling MFA is simple, inexpensive, and effective. To avoid user complaints that the extra step hurts their productivity, companies can implement a single sign-on (SSO) solution alongside MFA.


Use Strong Passwords & a Password Manager

In a world where most data is kept behind a username and password, credential compromise has become the main driver of data breaches. Employees continue to use weak passwords and reuse passwords because they simply have too many to juggle.

81% of data breaches are enabled by stolen passwords.

This tactic has two steps to better secure passwords and the accounts and data they are protecting. The first is to use strong passwords for every login.

A strong password has the following attributes:

  • Is at least 12 characters long.
  • Is unique (with no other account using that same password)
  • Includes a combination of upper-case and lower-case letters, symbols, and numbers

The way to solve the issue of employees having too many passwords to juggle is to use a password manager. Password management applications provide a secure place to store passwords. When employees need to retrieve passwords, they only need to enter and remember one. This gives them access to all the others.

Additionally, password managers will suggest strong passwords, so you’re not relying on employees to try to guess what is strong. When using a business account, you can have administrator access to all business-related accounts. This ensures you’re not locked out of an important interface should an employee be absent or leave the company unexpectedly.


Keep Device Software Updated

Keeping software updated is a core best practice of cybersecurity. Yet, many data breaches still happen because hackers exploited vulnerabilities for which a patch existed but wasn’t applied.

With the increase in devices used in a typical office, it can be complex to ensure all are updated. Organisations need to ensure that computers, smartphones, tablets, and IoT devices all stay current.

Further, each device will have three key types of software updates:

  • Operating system
  • Applications
  • Firmware

One of the easiest ways to ensure employee devices are staying current with required updates is to have this function handled through a managed IT services plan.


Learn How to Identify Phishing & Report It When Found

The fourth key tactic that can significantly improve cybersecurity is for employees to learn how to identify phishing and report it when they see it. Phishing continues to be the most popular delivery method for malware of all types. It’s also used widely for credential theft.

Phishing has become more sophisticated over the years, so users need to know to trust no message attachment or link that isn’t verified. They should also be aware that phishing via SMS is on the rise, and phishing can also show up on social media or via an old-fashioned phone call.

When phishing is identified, it needs to be reported. This allows the company to warn other employees and act to shut down the attack.

Schedule a Cybersecurity Check-up with FutureRange

Contact us today to schedule a consultation. Call +353 1 2960 560 (Dublin) +353 6140 0230 (Limerick) +353 21 2427974 (Cork) or reach us online.



Some related posts

5 Issues Co-Op Directors Need to Understand About Cyber Security

7 Essential Steps for Accountancy Firms to Take in the Event of a Cyber Attack

What is SASE & How Does it Promise to Future-Proof your Network?