{"id":3497,"date":"2020-01-15T23:41:31","date_gmt":"2020-01-15T23:41:31","guid":{"rendered":"https:\/\/ngx273.inmotionhosting.com\/~n7432d5\/news\/?p=3497"},"modified":"2020-11-19T15:21:13","modified_gmt":"2020-11-19T15:21:13","slug":"a-useful-business-cyber-security-checklist","status":"publish","type":"post","link":"https:\/\/www.cardonet.com\/news\/a-useful-business-cyber-security-checklist\/","title":{"rendered":"A Useful Business Cyber Security Checklist"},"content":{"rendered":"\n<p class=\"has-medium-font-size\">Defending your business is an integral part of running a business. You rely almost completely on technology, so a single attack could mean huge losses. Here are 8 factors that should be in your cyber security checklist. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Software Updates<\/h3>\n\n\n\n<p>Taking the time to update your software means that you always have access to the newest, strongest security features available. This is why it is always important to keep your operating systems up to date. If your business is still running Windows 7<a href=\"https:\/\/www.cardonet.com\/news\/why-your-business-should-upgrade-to-windows-10\/\">, <\/a><strong><a href=\"https:\/\/www.cardonet.com\/news\/why-your-business-should-upgrade-to-windows-10\/\" target=\"_blank\" rel=\"noreferrer noopener\">click here<\/a><\/strong> to learn more about why not upgrading to Windows 10 is a risky move. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Security System Updates<\/h3>\n\n\n\n<p>Whilst keeping your software updated is very important, it can only take you so far. Having dedicated security systems is the best way to protect your infrastructure. Security systems usually consist of anti-virus programmes and firewalls. These act by monitoring your network traffic and protecting it from viruses and malicious code. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Network Security<\/h3>\n\n\n\n<p>A large number of network breaches happen when a wireless network is left open. It is important to secure your WiFi and be aware of unidentified and unauthorised users and devices. A network security system, such as a strong firewall, will monitor your traffic and prevent unauthorised access.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Employee Training<\/h3>\n\n\n\n<p>One of the most important aspects of keeping your business safe is empowering your employees to use technology safely. Train them in company security policy; for example, creating strong passwords and changing them every 30 days; being aware of potential malicious links that they receive through email or reminding them of procedures for encrypting personal data. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Password Policy<\/h3>\n\n\n\n<p>Your company should have an IT policy which requires strong, complex passwords. This means passwords of at least eight characters with a combination of uppercase and lowercase letters, numbers and special characters. Users should be required to change their password after a certain period of time and previous passwords should not be re-used. Employees should be reminded never to write their passwords down and not to share them with anyone else. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. Data Backups<\/h3>\n\n\n\n<p>Backing up your data in multiple places is crucial. Once you\u2019ve identified the data that needs to be backed up, particularly sensitive data that could fall under GDPR or CCPA, you must implement backups regularly. If your business has already migrated to the cloud, backing up your data is not an onerous task. However, the cloud is still vulnerable to data loss or hacking so it is a good idea to have a local backup. The strongest protection comes from following the 3-2-1 rule: keep at least <strong>3<\/strong> copies of your data, store <strong>2<\/strong> backup copies on different storage media, with <strong>1<\/strong> of them being offsite. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">7. Device Security<\/h3>\n\n\n\n<p>Your employees\u2019 personal mobile phones may well be used to access the company network, whether from work on the go. Whilst this is convenient and allows employees to work remotely, the risk of threat to network security is also increased. As I mentioned above, employee training is one the best ways to avoid this; when people understand the risks and know what to look out for, they can better prepare for worst-case scenario. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">8. Breach Response Plan<\/h3>\n\n\n\n<p>Finally, it is important to be aware that things do happen and that\nhaving a breach response plan will be hugely helpful in the event of a breach. Your\nplan should focus on recovering as much data as possible in the shortest amount\nof time, as response time matters hugely in mitigating the damage caused by\nsecurity breaches. You also need to have a procedure in place to ensure that\nyou have not inadvertently become non-compliant with GDPR or CCPA. <\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>Cardonet can provide you with\na comprehensive range of cyber security services to help you stay secure and,\nat the same time, help you demonstrate compliance with industry and regulatory\nstandards. Discover how we can help you with <strong><a href=\"https:\/\/www.cardonet.com\/cyber-security-services-business.php\">cyber\nsecurity services.<\/a><\/strong><\/p>\n\n\n\n<p>If you are concerned about cyber-attacks\nand how it could affect your business,&nbsp;<strong>&nbsp;call us\non&nbsp;<\/strong><a href=\"tel:+442030342244\"><strong>+44 203 034\n2244<\/strong><\/a><strong>&nbsp;or&nbsp;<\/strong><a href=\"tel:+13239848908\"><strong>+1 323 984 8908<\/strong><\/a><strong>&nbsp;Alternately, you can&nbsp;<\/strong><a href=\"https:\/\/www.cardonet.co.uk\/contact-it-services.php\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>contact us online<\/strong><\/a><strong>. We will be happy to help you overcome your hotel IT challenges\nso that you can improve your guest experience and set your hotel apart.&nbsp;<\/strong>Cardonet\nhave been&nbsp;working with businesses&nbsp;for the past twenty years to help\nthem overcome their technological challenges. We have engineering bases in the\nUnited Kingdom, Europe and Southern California and our group of highly\nexperienced engineers are available 24\/7 to assist and ensure that your IT\ninfrastructure is secure and running seamlessly.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Defending your business is an integral part of running a business. You rely almost completely on technology, so a single attack could mean huge losses. Here are 8 factors that should be in your cyber security checklist. 1. Software Updates Taking the time to update your software means that you always have access to the<\/p>\n","protected":false},"author":4,"featured_media":4099,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[520,1],"tags":[558,682,571,653],"class_list":["post-3497","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-uncategorised","tag-business","tag-cyber-security","tag-it-services","tag-software"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A useful cyber security checklist to help protect your business<\/title>\n<meta name=\"description\" content=\"Cyber security is a hugely important topic. Use this checklist to ensure your business is secure and protected.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cardonet.com\/news\/a-useful-business-cyber-security-checklist\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A useful cyber security checklist to help protect your business\" \/>\n<meta property=\"og:description\" content=\"Cyber security is a hugely important topic. Use this checklist to ensure your business is secure and protected.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cardonet.com\/news\/a-useful-business-cyber-security-checklist\/\" \/>\n<meta property=\"og:site_name\" content=\"News\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-15T23:41:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-19T15:21:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2020\/01\/cyber-defence-checklist.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"334\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rachael\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rachael\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A useful cyber security checklist to help protect your business","description":"Cyber security is a hugely important topic. Use this checklist to ensure your business is secure and protected.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cardonet.com\/news\/a-useful-business-cyber-security-checklist\/","og_locale":"en_US","og_type":"article","og_title":"A useful cyber security checklist to help protect your business","og_description":"Cyber security is a hugely important topic. Use this checklist to ensure your business is secure and protected.","og_url":"https:\/\/www.cardonet.com\/news\/a-useful-business-cyber-security-checklist\/","og_site_name":"News","article_published_time":"2020-01-15T23:41:31+00:00","article_modified_time":"2020-11-19T15:21:13+00:00","og_image":[{"width":600,"height":334,"url":"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2020\/01\/cyber-defence-checklist.jpg","type":"image\/jpeg"}],"author":"Rachael","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rachael","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cardonet.com\/news\/a-useful-business-cyber-security-checklist\/#article","isPartOf":{"@id":"https:\/\/www.cardonet.com\/news\/a-useful-business-cyber-security-checklist\/"},"author":{"name":"Rachael","@id":"https:\/\/www.cardonet.com\/news\/#\/schema\/person\/c62d005dc8af343ee7e1eeeb323cdf35"},"headline":"A Useful Business Cyber Security Checklist","datePublished":"2020-01-15T23:41:31+00:00","dateModified":"2020-11-19T15:21:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cardonet.com\/news\/a-useful-business-cyber-security-checklist\/"},"wordCount":751,"commentCount":0,"publisher":{"@id":"https:\/\/www.cardonet.com\/news\/#organization"},"image":{"@id":"https:\/\/www.cardonet.com\/news\/a-useful-business-cyber-security-checklist\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2020\/01\/cyber-defence-checklist.jpg","keywords":["Business","Cyber Security","IT Services","Software"],"articleSection":["Cyber Security","Uncategorised"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cardonet.com\/news\/a-useful-business-cyber-security-checklist\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cardonet.com\/news\/a-useful-business-cyber-security-checklist\/","url":"https:\/\/www.cardonet.com\/news\/a-useful-business-cyber-security-checklist\/","name":"A useful cyber security checklist to help protect your business","isPartOf":{"@id":"https:\/\/www.cardonet.com\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cardonet.com\/news\/a-useful-business-cyber-security-checklist\/#primaryimage"},"image":{"@id":"https:\/\/www.cardonet.com\/news\/a-useful-business-cyber-security-checklist\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2020\/01\/cyber-defence-checklist.jpg","datePublished":"2020-01-15T23:41:31+00:00","dateModified":"2020-11-19T15:21:13+00:00","description":"Cyber security is a hugely important topic. Use this checklist to ensure your business is secure and protected.","breadcrumb":{"@id":"https:\/\/www.cardonet.com\/news\/a-useful-business-cyber-security-checklist\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cardonet.com\/news\/a-useful-business-cyber-security-checklist\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cardonet.com\/news\/a-useful-business-cyber-security-checklist\/#primaryimage","url":"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2020\/01\/cyber-defence-checklist.jpg","contentUrl":"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2020\/01\/cyber-defence-checklist.jpg","width":600,"height":334,"caption":"cyber defence checklist"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cardonet.com\/news\/a-useful-business-cyber-security-checklist\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"News Home","item":"https:\/\/www.cardonet.com\/news\/"},{"@type":"ListItem","position":2,"name":"A Useful Business Cyber Security Checklist"}]},{"@type":"WebSite","@id":"https:\/\/www.cardonet.com\/news\/#website","url":"https:\/\/www.cardonet.com\/news\/","name":"News","description":"IT Services from Cardonet","publisher":{"@id":"https:\/\/www.cardonet.com\/news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cardonet.com\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cardonet.com\/news\/#organization","name":"Cardonet","url":"https:\/\/www.cardonet.com\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cardonet.com\/news\/#\/schema\/logo\/image\/","url":"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2018\/06\/it-support-london-cardonet.png","contentUrl":"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2018\/06\/it-support-london-cardonet.png","width":1920,"height":1080,"caption":"Cardonet"},"image":{"@id":"https:\/\/www.cardonet.com\/news\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cardonet.com\/news\/#\/schema\/person\/c62d005dc8af343ee7e1eeeb323cdf35","name":"Rachael","sameAs":["http:\/\/www.cardonet.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/posts\/3497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/comments?post=3497"}],"version-history":[{"count":0,"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/posts\/3497\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/media\/4099"}],"wp:attachment":[{"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/media?parent=3497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/categories?post=3497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/tags?post=3497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}