Financial Data
Updated 30 Mar 2020


Your top 5 security threats

A staggering 70% of SME's worldwide fell victim to spyware and virus infections in 2007.


05 April 2010  Share  0 comments  Print


All the answers to your unique business lifestage questions

In order to protect yourself, you need to know who and what the enemy is. Meet the five prime suspects and how to vanquish them.

Protecting your systems from spyware and virus infections means knowing know who and what the enemy is. Meet the five prime suspects and how to vanquish them.

  1. Viruses and worms: These are by far the most common network security threat. PREVENT THEM BY using up-to-date virus protection software and by training your office staff to never open an email attachment that they weren't expecting.
  2. Trojan horses: Usually disguised as something else (like a computer game or link to a video or search results page) a trojan horse downloads and installs "malware" on your computer that can be used to steal account information or passwords. PREVENT THIS BY not downloading freeware, blocking links embedded in emails, and restricting access to certain pre-approved websites.
  3. Phishing: This refers to emails that trick you into accessing an insecure website and typing in personal account information. PREVENT THIS BY educating yourself about the most common phishing scams. Use email filters to limit the number of phishing attacks that reach your inbox.
  4. Residual data: Stolen or sold laptops and computers pose one of the biggest threats for networks, as system passwords are often still on the hard drives and can be retrieved. PREVENT THIS BY encrypting sensitive data, clearing hard drives properly and keeping close track of mobile devices such as smartphones or memory sticks that are used near sensitive data.
  5. Shared computers/connections: Shared computers and unsecured WiFi access points are a lot like public bathrooms - they may appear clean, but are usually full of viruses. PREVENT problems by ensuring that employees don't log into important online accounts from a public computer or public hotspot.
Rate It12345rating

Introducing the theft & fidelity protection for your business

Theft and fidelity cover are often confused with each other. Bryan Verpoort discusses the difference between the two and why your business should be putting measures in place for both of these risks.

Login to comment