top of page
  • jamesanstee

Keeping your business safe online

As online scammers and hackers continue to find new and creative ways to sting and damage businesses, it is more important than ever to stay projected.

In this article we look at some of the most common ways fraudsters may attempt to attack your business and measures you can put in place to stay protected.

Phishing Emails

Nowadays phishing emails are becoming more difficult to detect and more sophisticated in the way that they mimic your organisation's format. More and more employees are getting emails from what they believe to be their manager, asking them to make purchases, send passwords and give over key info, only to find it's a scam.

It isn't only our business that we have to be wary of receiving false emails from but also our bank, the post office and subscription services to name a few.

Some ways your employees can protect themselves and the business are:

● Never Open Unexpected Attachments.

● Never Use Company Email for Personal Reasons

Remote working risks

With the vast majority of businesses now working somewhat remotely there is a greater risk for businesses of scammers and hackers. As employees log onto different wifi networks, around the country and sometimes the world, with many employees often on the move and using public wifi, there are risks everywhere for businesses.

While it is up to staff to use common sense to keep the business safe, your business should have specific and up to date policies when it comes to cyber-security. If you are looking for some short-term protection whilst your cyber-security plan is being developed here are some recommendations to give to all employees:

● Avoid Public Wifi (or Use a VPN)

● Be Careful What You Click.

● Pick Strong Passwords.

● Use Two-Factor Authentication.

It can be difficult for businesses to identify where they are most vulnerable to a cybersecurity attack, our team can help you identify weaknesses and ensure you have the necessary protection in place.

19 views0 comments


Post: Blog2_Post
bottom of page