Protecting your business from cyber criminals

Camilla Stevenson, tutor in cyber security at Coventry University Scarborough Campus has the following advice to keep your business safe:

‘Keeping your devices and information secure in the cyber world is essential in today's digital age. One of the most important steps is to use strong, unique passwords for all your accounts and enable two-factor authentication when available. A strong password is a combination of characters that is difficult for others to guess or crack. It typically includes a mix of uppercase and lowercase letters, numbers, and special characters, and is at least 12 characters long. Avoiding the use of easily guessable information such as your name, birthdate, or common words can make your password stronger.

It's important to note that a strong password alone may not be enough to keep an account secure, as other security measures such as multi-factor authentication can be used to provide an additional layer of security. An example of multi-factor authentication is when a user enters their password and receives a code through SMS or phone call to enter in a second field to access the account. This would mean that the user would need to know the password and have access to the phone that received the code. It can greatly enhance the security of your accounts and information, as it makes it much harder for unauthorised users to gain access, even if they have obtained a user's password.

Another important step is to be cautious when clicking on links or downloading attachments from unknown sources, as these can often contain malware. Malware, short for malicious software, is any software specifically designed to harm or exploit computer systems and networks. Malware can be delivered to a device in various ways such as through phishing emails, malicious websites, or infected software downloads. It is important to be aware of the risks and to take steps to protect your device, such as using anti-virus software, avoiding clicking on links or opening attachments from unknown sources, and keeping your software up to date.’