shutterstock_120829516

How to keep your workstations safe from cyber attacks?

Massive cyberattacks has been occurring in Australia more frequently. The cyber criminals are targeting businesses of different sizes and are causing detrimental impact on their victims. As the level of technological knowledge increases, the techniques and strategies of cyber criminals gets more sophisticated. This calls for everyone to be more vigilant and ensure that all internet activities are safe. Here are some precautionary measures that you may want to practice in your company’s workstations:
• Do not open files you don’t trust or are from unknown sources. If you receive an email or a file which looks suspicious, or is from an unknown source, do not open it.

• Stay away from outdated and/or pirated software. Outdated software may contain vulnerabilities which can be exploited by hackers.

• Keep your computer/server updated. Turning on automatic updates, which will allow windows to be updated automatically when you connect to the internet.

• Third-party firewall and anti-virus: Windows being the most common operating system around the world means that it is a common target for hackers and criminals and they usually design their code for the most common environment, which includes the default Windows Firewall and Windows Defender. If you want to increase protection, you should consider investing in a good firewall and anti-virus.

• Backup your data regularly. Even if it seems to be redundant, it’s better to be safe.

• Educate your workforce. Have company meetings which stress that workers shouldn’t click on questionable links or open suspicious attachments. System administrators should ensure that employees don’t have access to parts of the network that aren’t required. This helps limit the spread of ransomware if hackers get into your network or system.

• If hit, don’t wait, take action. Some organizations shut down a network when a breach is detected. Shutting down a network can prevent the spread of virus/ransomware. If you are asked for a ransom and your files are locked, law enforcement and cyber security experts discourage paying ransoms as it gives incentives to the hackers and there is no guarantee that all files will be restored.

• Scrutinize links and files contained in emails and web pages. Carefully check the links contained in an email or a web page. See the link it is pointing to, usually it appears at the bottom of the window when you hover your mouse over it. It may also appear by keeping the cursor over a link for few seconds without clicking.

• Only download software from trusted sources. If you want to download a software, prefer to download it from the official website. If you are not sure about the website, doing a quick web search will give a hint towards the official website.

You may consult NEXIO if you want to be more confident on the status of your online business security.
NEXIO is a full-service provider of IT Solutions to SMB organizations in Campbelltown and Sydney. Our broad and vast solution set includes the full gamut of IT Services plus an array of Cloud Solutions, Security Services, and Project Management.

Contact Us
  • This field is for validation purposes and should be left unchanged.