Top tips to avoiding imminent cyber attacks within your business
-
Upload
staples-rodway -
Category
Internet
-
view
85 -
download
0
Transcript of Top tips to avoiding imminent cyber attacks within your business
![Page 1: Top tips to avoiding imminent cyber attacks within your business](https://reader035.fdocuments.us/reader035/viewer/2022081605/58f104fc1a28ab7b318b4601/html5/thumbnails/1.jpg)
TOP TIPS TO AVOIDING IMMINENT CYBER ATTACKS WITHIN YOUR BUSINESS
ByIT Director, Rob McEwanStaples Rodway Taranaki
![Page 2: Top tips to avoiding imminent cyber attacks within your business](https://reader035.fdocuments.us/reader035/viewer/2022081605/58f104fc1a28ab7b318b4601/html5/thumbnails/2.jpg)
DON’T OPERATE YOUR COMPUTER AS AN ‘ADMINISTRATOR’
Administrator
Programme with
malware
Your other programm
es
Your other programm
es Your other programm
es
Your other programm
es
As an administrator, every program you run has unlimited access to your computerIf malware is able to take hold through one of those programs it can access
all parts of your computer or potentially your network
![Page 3: Top tips to avoiding imminent cyber attacks within your business](https://reader035.fdocuments.us/reader035/viewer/2022081605/58f104fc1a28ab7b318b4601/html5/thumbnails/3.jpg)
UPDATE SOFTWARE, PATCHES AND UPDATES IMMEDIATELY
Update
UpdateAs soon as patches are released hackers reverse engineer the patches to identify the problems that are being addressed.
The quicker you can apply patches for all products you have installed on your computer, the less likely you will be exposed to these hackers.
![Page 4: Top tips to avoiding imminent cyber attacks within your business](https://reader035.fdocuments.us/reader035/viewer/2022081605/58f104fc1a28ab7b318b4601/html5/thumbnails/4.jpg)
REMOVE SOFTWARE THAT YOU DON’T NEED
The less applications you have on your PC, the less you have to update and the less
targets hackers have.
![Page 5: Top tips to avoiding imminent cyber attacks within your business](https://reader035.fdocuments.us/reader035/viewer/2022081605/58f104fc1a28ab7b318b4601/html5/thumbnails/5.jpg)
HAVE A REPUTABLE ANTI-MALWARE (MALICIOUS SOFTWARE) SOLUTION
INSTALLED AND USE ITS ADVANCED FEATURES
Find out more
![Page 6: Top tips to avoiding imminent cyber attacks within your business](https://reader035.fdocuments.us/reader035/viewer/2022081605/58f104fc1a28ab7b318b4601/html5/thumbnails/6.jpg)
BACKUP YOUR COMPUTER
OriginalData (1) Backup
(2) Backup
(3) Off site backup
Data should not be considered backed up until there are three copies, two of
which are backups of the first, and one of those backups must be off-site
![Page 7: Top tips to avoiding imminent cyber attacks within your business](https://reader035.fdocuments.us/reader035/viewer/2022081605/58f104fc1a28ab7b318b4601/html5/thumbnails/7.jpg)
Our Taranaki IT team work with companies to identify security
risks and help to eliminate them
Rob McEwan, IT Director06 757 [email protected]
CLICK HERE TO FIND OUT MORE