FORCE
Passwords There are few more important things you can do than to regularly change your passwords, and ensure they aren’t obvious. There are too many stories of people using their partner’s, child’s or pet’s name as a password! A good rule is to ask yourself whether someone who knows you really well, couldn't guess your password in 20 attempts. Also, NEVER write them on a piece of paper and leave it next to your device, believe it or not this is more common than you would imagine! Further encrypt documents such as spreadsheets with a separate password and if you do need to let someone know a password, be sure to change it once their need for it has passed. Of course, if you employ staff that use tech devices then the same rule applies, so make sure they are aware of the same level of importance being attached to their passwords, alternatively, come up
You need to understand what a cyber attack is in relation to how it could compromise your business activities; it can damage you in the form of the theft of valuable data or even cash and can cause an amount of disruption to the running of your business that can result in you losing clients or even not being able to trade. So if we take a very basic look at an example of how your business could be compromised by technology, it may provide a wake up call for many readers. Do you use a laptop that contains information about contracts that you are tendering for? Does it also contain details of previous clients, the fees you charged and the service you carried out for them? Imagine how useful this information could be to an unscrupulous competitor. If they were able to get hold of your laptop then just how difficult would it be for them to access this information?
Federation of Regional Crime Enforcement
Made with FlippingBook - Online Brochure Maker