• HOME
  • MEMBERSHIP
  • IN THE COMMUNITY
  • MARKETPLACE
    • SECURITY PRODUCTS
  • ABOUT US
    • PARTNERSHIPS
    • OUR TEAM
  • NEWS & EVENTS
    • EVENTS
    • PRESS RELEASES
    • BLOG
    • MEDIA OVERVIEW
    • GALLERY
  • TIPS & ADVICE
  • HOME
  • MEMBERSHIP
  • IN THE COMMUNITY
  • MARKETPLACE
    • SECURITY PRODUCTS
  • ABOUT US
    • PARTNERSHIPS
    • OUR TEAM
  • NEWS & EVENTS
    • EVENTS
    • PRESS RELEASES
    • BLOG
    • MEDIA OVERVIEW
    • GALLERY
  • TIPS & ADVICE

Five Top Tips to Keep you Cyber Secure

25-September-2017
-
Blog
-
No comments
-
Posted by Tom Lejava
Computer security

Guest blog by Andy Taylor – Lead Cyber Assessor at APMG.

AMPG International logo

Every day we hear of new attacks, new ways of depriving us of money, our information or our privacy, and every day we hear companies offering the latest “silver bullet” to stop these incessant attacks. There is, at the end of the day, no 100% guarantee of cyber security other than not connecting to the internet at all. That option might at times seem very desirable, but as the world becomes ever more digital in nature, especially in business, there is little chance of that option being realistic for most of us.

There are, though, a few basic things we should all be doing whether we are a small business, a large business or just an individual trying to protect ourselves. These have been uniformly agreed by governments from many countries including the UK. In the UK it’s a scheme called Cyber Essentials and it lists the five cyber security fundamentals everyone should do to stay as safe as possible. They are straightforward and many will not recognise them as anything new – just effective!

  1. Patching. It has been proven time and again that patching the software issues is critical to staying safe. Criminals using the holes or vulnerabilities in software often use the older ones very effectively, the ones that the software manufacturers know all about and have fixed, often a while ago. Set all your software to patch automatically – it is the best solution.
  2. Passwords. This has been perhaps the most discussed topic of recent weeks. Passwords are still, whether we like it or not, the most powerful form of security we have available. Changing passwords from the one set by default when the software is first installed is vital. Criminals know all the default ones. Making the password difficult to guess or work out is also important. The advice today is legion but perhaps the best is to use three ordinary unrelated words eg: horseyellowAfrica! could be very suitable password. Adding capital letters and a bit of punctuation make it very difficult to guess or work out. There is no longer any guidance suggesting the regular changing of passwords, only do so when necessary because of a breach or other reason. Not using the same passwords for lots of accounts is also important but the use of a password manager is probably the best solution. This will store all your passwords for you, will suggest strong passwords, and all you need to do is remember one strong password to access the system.
  3. Privileged user accounts. When systems and software are set up it will by default set up an administrator account that can do just about anything on the system. Naturally this is vital and it must be there but it must not be the account used every day for things like email, playing games and downloading music. There must be a more limited user account and this should be the one routinely used for day-to-day work and play. Admin accounts should not have an email account associated with them and should have a different (strong) password from the everyday account.
  4. Securing the boundaries. Make sure there is an effective boundary to your network. Often for small companies and private individuals this will be the router supplied by the Internet Service Provider (ISP) but make sure it is well configured and doesn’t have a guest account that anyone with the right (default) password can access. The settings on the router and firewall must be secure but that may be down to the provider – you’ll have to trust them!
  5. Secure configuration. Finally ensure that the configuration of the system is appropriate. Don’t leave any active user accounts of those who have left, close them or delete them. Don’t allow programs to run automatically when removable media (such as USB memory sticks) are put into the computer. Make sure there is some form of anti-malware protection on the system, often best on all connected devices including phones and tablets if they are used for business. Configuring the system securely is not difficult but must be done properly to be secure.

If you and your system can meet these requirements then Cyber Essentials awaits you. The scheme is increasingly being used by larger companies and government to protect themselves from other organisations in their supply chain where electronic trading or communications are routine. Assessment is fairly reasonable from £300 +VAT and it might just make you stand out from the crowd when competing for more business.

London Digital Security Centre members receive a 10% discount on APMG’s Cyber Essentials until 28th November 2017.

Learn more about APMG.

Tags
Cyber Essentials
← PREVIOUS POST
What Is Penetration Testing? – Part One: The Perimeter
NEXT POST →
Are you ready to be proactive about GDPR and ISO 27001?
Categories
  • Blog
  • Press Release
Recent Posts
  • Is your business cyber-ready?
  • You’ve Got Mail: 5 Tips to Secure Your Email
  • #OneReset - What could you really lose in a hack?
  • Here’s what GDPR means for your business!
  • Essential Advice for Small Business Cyber Security
London Digital Security Centre

We are a Not for Profit organisation, launched by the Mayor of London as a joint venture with the Metropolitan Police and City of London Police.

Leave a Comment

Your feedback is valuable for us. Your email will not be published.
Cancel Reply

Please wait...
Submit Comment

Related News

Other posts that you should not miss.
GDPR

GDPR – so what…?

25-October-2017
-
Blog

…is it? The General Data Protection Regulation (GDPR) comes into force on May 25th 2018. It outlines how organisations should manage and protect personal information. …does it mean? …

Read More →
Posted by Tom Lejava
2 MIN READ
Policy Forum for London

Policy Forum for London seminar

09-August-2017
-
Blog

  Crime and policing in London - next steps for crime prevention, addressing key crime trends and improving police performance   Westminster Forum Projects have shared with …

Read More →
Posted by Tom Lejava
2 MIN READ
LDSC knowledge update

Knowledge Update: 13 October 2017

13-October-2017
-
Blog

This weeks Knowledge Update talks about Equifax claiming 700k UK customers affected by the data breach, over 100 local councils are exposing users by not implementing DMARC and a …

Read More →
Posted by Tom Lejava
2 MIN READ
Twitter Follow
Tweets by LondonDSC
Social Connect
News
  • 18-March-2019
    Is your business cyber-ready?
  • 05-February-2019
    You’ve Got Mail: 5 Tips to Secure Your Email
  • OneReset
    23-October-2018
    #OneReset - What could you really lose in a hack?
Contact Us

Company Number : 09639299
Mail to : [email protected]
Address : One Wood Street, London,
United Kingdom, EC2V 7WS.

Built by Cyber Rescue
Privacy   T & C
Copyright London Digital Security Centre (LDSC) 2017
Five Top Tips to Keep you Cyber Secure - London Digital Security Centre
 Logo Header Menu
MENU
  • HOME
  • MEMBERSHIP
  • IN THE COMMUNITY
  • MARKETPLACE
    • SECURITY PRODUCTS
  • ABOUT US
    • PARTNERSHIPS
    • OUR TEAM
  • NEWS & EVENTS
    • EVENTS
    • PRESS RELEASES
    • BLOG
    • MEDIA OVERVIEW
    • GALLERY
  • TIPS & ADVICE