By Emma Pegg | Sep 4, 2018
As more and more businesses move to the cloud, the risks we once faced with paper have become digital.
How can you protect your firm from cybersecurity breaches? Here are 3 steps to start securing your data and
minimise the risk for your firm. Plus, here’s how to make cybersecurity an integral part of your value offering.
First, when you move to the cloud, you store data remotely – usually on servers and data centres managed
24/7. There are three tiers of cloud-based software:
Cloud-based computing is one of the most secure methods of data storage. If one computer crashes, the
operation will move to another part of the system. Plus, your data will be end-to-end encrypted. That said,
77% of IT pros believe their businesses will be hacked and almost half aren’t ready for it. Plus, according to this
report by Sophos, 42% of IT Pros report at least 1 phishing attempt daily.
Here are three steps you can take to help protect your firm today.
Step One: Train your team on the cyber security essentials.
This is an investment in your firm and employees’ futures. IBM estimated that 90% of all digital data evercreated was generated in the past two years. Much of that is being stored online. That means every time you get into work and open your laptop, or unlock your smartphone and check emails on your commute, you are
accessing and creating data.
If your team were driving cranes, you would make sure they have the correct training. It’s no different
navigating the digital landscape with your laptop and smartphone. If you haven’t already, establish a clear
and concise data security policy. After sharing the reasons behind putting it in place, be sure to onboard
your team from the start and put a strategic plan in place in case of a data breach.
Step Two: Use strong passwords.
Nearly one in five businesses have passwords that are weak or shared, according to a report from Preempt.
While passwords are not the perfect solution, they are often your first line of defense. In fact, Adam
Lovingood, Xero America’s Head of Legal, calls them the “green leafy vegetable of IT security – we knowthey’re good for us, but we don’t really like them”.
Here are six rules of thumb:
Step Three: Do an internal audit of your software.
If you already use cloud-based solutions, make sure your vendors are prioritising security and have adequate
policies in place.
Here are some good questions to start with.
Likewise, how would you answer these questions should one of your clients ask you this? Could you answer
each one confidently?
Rather than prioritising cyber security just out of fear of a breach or compliance, put it at the heart of your
services. By preparing yourself first, you can then share these learnings with your clients on cyber security and
data protection, thus add value to your consulting services.
The Original content was posted on ReceiptBank