Cyber Hygiene

These videos cover the basic elements of good cyber hygiene, to help you keep your organization’s data safe.

Good Cyber Hygiene

We’ve covered a lot of ground in these videos. Our goal is not to scare you; but to give you the ability to protect your organization and its data. If something does go wrong, never try to cover it up – it can potentially make things many times worse. Honesty is always the best policy. Remember, we’re here to help you. If you have any questions or concerns, or just want to learn more cyber security best practice, get in touch

Hackers

Welcome to this important video series about how to keep your organization’s data safe. In this first video, we show you how easy it is for hackers to break into any computer.

Threats that exist within your organization

In this second video, we look at the threats facing you from within your organization.

What you can do to keep your organization safe

This final video is the most important. It covers the three key areas to keep your organization’s data safe.

In Conclusion

Six basic checks:

  • The sender’s address: Always make sure the email address is legitimate. Amateur hackers will send emails from Gmail or Hotmail accounts and hope you don’t notice. More sophisticated hackers will closely mimic an actual email domain, like amazonnprime.com rather than amazon.com. Double-check the email address before opening, clicking links, or responding.
  • Discrepancies in the writing format: If the attack is coming from overseas, you’re likely to notice some small issues in writing format, like writing a date as 4th April 2021, rather than April 4, 2021. While this is subtle, it should be a red flag.
  • Spelling and grammar issues: You might find an occasional typo in any email, but if you receive one riddled with grammar and spelling mistakes, consider the source. It’s likely a hacker – especially if the email supposedly comes from a major organization.
  • Link destination: Before you click on any link in an email, hover over it. The destination URL should pop up. Check out the domain name of this URL. Similar to the sender’s email address, make sure that this address is legitimate before clicking.
  • Attachments: Don’t open any attachment you didn’t expect to receive, whether it’s a zip file, PDF, or anything else. Hackers want you to launch attachments so they can access your computer, as we saw in the first video.
  • Logo: Hackers try their best to mimic the look and feel of a business in their emails, including replicating logos. Often, they get very close, but they won’t be perfect. If something feels off, it probably is.

Book a 15 minute call with us at a time that suits you. There’s are no obligation.