Skip to the content
Menu
Jack Smallpage, Information Security Officer at Chess, explains the five simplest things you can do to protect your business and improve your cyber security.


.

Cyber security is a broad subject with hundreds of do's and don't's and can often be a daunting challenge. However, there are core pillars you can focus on easily to boost your business' security. The tips below should provide you with some easy actions to help you take the first steps to become cyber secure!

 

Mobile Device Management

Smartphones and tablets can be just as powerful as traditional computers but leave the safety of the office/home far more frequently.

  • Identify what your people's mobile devices can potentially access. Devices may sync with the company's OneDrive or Teams to access files and conversations. Even basic email access exposes the phone to information and attachments that we all have scattered within our mailbox.
  • Make sure that any device that has access to your business' data is secured and controlled. Solutions such as Microsoft's Intune or Sophos Mobile can help manage your mobile devices, control what data is available to your people and how that data is used.

 


Email Security
"Phishing is when attackers attempt to trick users into doing 'the wrong thing', such as clicking a bad link that will download malware, or direct them to a dodgy website."

Source: National Cyber Security Centre

Phishing remains the most common threat vector in the 2021 Cyber Security Breaches Survey. So it is no surprise that all businesses, big and small, are almost guaranteed to receive phishing attacks at some point. Help keep your people safe with the following:

  • Give as little access as possible: Configure your people's accounts using the 'least privilege' principle. A compromised admin account can cause untold damage while a 'least privilege' user can help restrict malicious actions after compromise.
  • Educate your people. Here's four things Mimecast recommend to look for:

1. Look for inconsistencies in links, addresses and domains.

2. Watch out for bad spelling and grammar and unfamiliar language.

3. Be suspicious of demands for urgent action.

4. Be wary of attachments.

  • Have an easy method for reporting suspected emails and investigating them. For those that are able to, Microsoft 365’s Phishing Investigation tool offers a great reporting and automated investigation function with proactive phishing detection and protection which can help take some strain off your technical / security people while making it easier for your end users. However, for those wanting a more basic approach, a simple process combined with proper end-user training can also suffice. Try including frequently asked questions in your process to help your users such as:
        • What do we report? (Do you want them to report all suspected phish or simply delete them)
        • Who do we report to? (Who should handle these phish reports or questions)
        • How do we report? (How should your users forward their suspected phishing to you)



Keep your systems and software up to date!
  • Know what IT equipment is on your network and what software is installed on each device.
  • Ensure all software and firmware are kept up to date with the latest versions (this is also known as patching). Where possible and available, systems should be set to 'automatically update' with patches being installed within 14 days of release as a rule of thumb.

With over 20,000 vulnerabilities (CVE's) reported in 2021 alone, reinforce your patching regime with adequate vulnerability assessment and management to help identify systems and areas that may have been forgotten or missed - we're only human after all!

Know when products on your network reach their 'end of support' date and no longer receive security updates. In such cases, you should strongly consider replacing the product with a modern alternative, especially for those which are internet facing.


 


Passwords

To make sure you're making the most of passwords within your business, consider the following:

  • Use two-factor authentication (2FA), which requires a user to provide an additional action (usually a code via their smartphone) before gaining access to the account. This should be applied as widely as possible, but it's particularly important for admin and internet-facing accounts.
  • Make sure to give your people guidance on setting secure passwords and ensure your systems enforce these requirements wherever possible. Here's a helpful guide from the government, click to read it.
  • Password managers provide a secure way for your people to create and store their passwords via a 'master' password. The master password itself must be strong and should support 2FA or similar to ensure the vault is secure. Give your people a fighting chance by helping with the large amounts of passwords they deal with!
  • Stop enforcing regular password changes. This helps users choose more secure passwords than weaker ones with repetitive sequences. Instead, you should only need to change passwords when you suspect they have been compromised.


Cyber Awareness

One of the most effective wins to becoming cyber secure is your people's training and security culture. All the processes and measures in the world can be useless if the user doesn't know how to use them properly. Your people must report any phishing and security incidents as soon as possible and feel safe to ask for help if unsure (even if they have already clicked). Punishing people for getting caught out only discourages them and others from reporting in the future, causing delayed response or even no response at all resulting in greater harm to your business in the long run.

 

To learn more about how you can protect your organisation, book your free 30-minute security consultation with one of our penetration testers. Get agnostic advice from industry experts on how secure your business.
Request here >

Recommended Content

Top 3 tips for Working Securely from Anywhere

Top 3 tips for Working Securely from Anywhere

Megan Yates, Consultant at Chess, summarises the top three things you need to operate in a post-Covid world.

Make calls and save money after 2025

Make calls and save money after 2025

Grant Thain, Vendor Manager and Connectivity Expert at Chess, advises how you can retain your phone line after 2025.

Jack Smallpage

Jack Smallpage

Jack Smallpage is the Information Security Officer at Chess. He creates and maintains our security policy, takes lead in a variety of compliance certifications and security projects and acts as the company security liaison for security incidents, BCDR planning, GDPR compliance and risk management.


Speak to a Product Specialist

You can fill out the form and one of our product specialists will contact you shortly with more information.
Sales
To contact our Sales team directly, please call 0344 770 6000 and choose option 4.
Customer Service
For general queries or to report a non-urgent fault, please log a ticket on our customer portal using the email address associated with your account. Logging a ticket is quick and easy to do. Once you have logged your ticket, we will respond within 24 hours or your Service Level Agreement, whichever is quicker.
I agree for my information to be used for marketing communications.
Chess Privacy Notice

By submitting your personal information through this form, you consent to your information being processed in accordance with the Chess group privacy notice.