Today, cyber crimes have become a real business process: stolen data may be sold to interested persons or returned to the owners for a substantial sum. By disregarding security, companies lose money and reputation. Vladimir Levashov, Head of Information Systems Department at BDO Unicon Outsourcing, has given several tips that will help to save your business.

Обучение.png


Train your employees 



Phishing scam letters have become the most common way of attack: a worker receives a letter from an unknown user with a link to an external resource or with a malicious file. This way the infection takes place, and the consequences may become irreversible.

Hackers become more inventive: you may receive a letter from an “official representative of a company”, the address will be different in one letter, and you will not notice the difference.

Therefore, you should hold trainings and seminars where employees can learn about the sources of threats, about what to do if an incident has taken place (a malicious file was opened, an employee installed software that damaged the system, etc.). It is necessary to arrange training events on a regular basis: criminals are creating new methods of systems hacking and data theft.

2-6.png

Develop a plan of response to hacker attacks


 
Do your employees know what to do after opening a phishing scam letter? Or after files disappear from the desktop? Majority of workers try to rectify a problem on their own or to conceal an incident, if the consequences are non-obvious. As a result, you lose time and chances to remedy the situation with minimum consequences.

For example, by gaining access to one device, a criminal can get into the whole system. This way, as a result of hacking one account, hackers have gained access to an audit company’s correspondence with clients. There are many similar examples, so you should have a clear algorithm of actions: what to do in case of a threat of infection, to which employee to turn to, whether it is worth trying to solve the problem on one’s own, etc. You will have to familiarise each and every employee with such an instruction.

2-7.png

Hold audit of information systems




This step will provide you with an insight into the information systems’ errors hindering the business development, as well as into the extent of the systems protection against cyberattacks. Try to involve only reliable contractors to the audit.

2-8.png

Install intrusion tracking systems


 

Modern systems analyse data flows in communication channels by the type of protocol being used. Owing to new technologies, a system administrator can prevent unauthorised intrusions by application protocols: HTTP, Skype, FTP, etc.
The systems can also block malicious traffic and requests for remote control of a computer.

2-9.png

Improve the personnel’s skills



 
A highly skilled security service is not a fancy of large companies but a necessity for any business.

The work of your IT specialists should be based on the “forewarned is forearmed” principle. Now, a great number of both Russian and foreign webinars, trainings, seminars take place, some of them may be attended for free.


Source: hr-tv.ru


Поделиться:


Subscribe to our publications
We write only about the most important. You will be the first to know about economic events that affect your business, how to reduce costs, optimize the company's operations and make the right management decisions without immersion in operational processes.
Subscribed
  • Связаться с нами

    Оставьте обращение в форме ниже, и мы обязательно ответим вам

    Нажимая на кнопку, вы соглашаетесь на обработку персональных данных

    Обратите внимание: мы работаем только с компаниями на ОСНО. Наши решения не подходят ИП и компаниям на УСНО

  • Image
Отправить заявку
  1. Unicon Outsourcing
  2. Blog
  3. How to keep yourself safe from hacker attacks?
We use cookies to improve our service. By continuing working with the website, you accept Terms and Conditions and give your consent for us to process your personal data in accordance with the Unicon BS JSC Policy on personal data processing. I AGREE