Tech Tutor by SisAdmin

Russian cyber-attack threat: How to protect your business - SisAdmin

Written by Craig Cameron | Apr 5, 2022 3:27:36 PM

JTNDaWZyYW1lJTIwd2lkdGglM0QlMjI1NjAlMjIlMjBoZWlnaHQlM0QlMjIzMTUlMjIlMjBzcmMlM0QlMjJodHRwcyUzQSUyRiUyRnd3dy55b3V0dWJlLmNvbSUyRmVtYmVkJTJGVVJkeEVWamotanMlMjIlMjB0aXRsZSUzRCUyMllvdVR1YmUlMjB2aWRlbyUyMHBsYXllciUyMiUyMGZyYW1lYm9yZGVyJTNEJTIyMCUyMiUyMGFsbG93JTNEJTIyYWNjZWxlcm9tZXRlciUzQiUyMGF1dG9wbGF5JTNCJTIwY2xpcGJvYXJkLXdyaXRlJTNCJTIwZW5jcnlwdGVkLW1lZGlhJTNCJTIwZ3lyb3Njb3BlJTNCJTIwcGljdHVyZS1pbi1waWN0dXJlJTIyJTIwYWxsb3dmdWxsc2NyZWVuJTNFJTNDJTJGaWZyYW1lJTNFThe ongoing Russian invasion of Ukraine has led to a sharp rise in cyber-attacks.

And while many of the attacks are between these two countries, there is very real potential for other countries to fall victim to cyber-attacks by Russia, thanks to the sanctions placed upon it.

President Joe Biden’s declared the government has been improving national cyber security defenses for some time now.

They’re focusing on the infrastructure to make sure that water, electricity, and oil pipeline services aren’t at increased risk of attack.

The White House has also issued a warning and some very good cyber security advice to all businesses.

There are a series of actions that businesses should be taking immediately to protect themselves against cyber-attacks, and other data security risks.

To start with look at implementing multi-factor authentication. This is where you generate a login code on another device, to prove it’s really you logging in.

Data backups should also be checked on a regular basis. Ideally there should be a copy of data that cannot be changed during a cyber-attack.

All data should also be encrypted, meaning it would have no value and be unusable if anyone did manage to access it.

It’s also a good idea to have an incident response plan ready to go that will help mitigate any attack quickly and effectively.

Businesses are also being advised to give their staff cyber security training to help them spot and avoid the common tactics used by cyber criminals.

These include phishing attacks where they send an email pretending to be someone else. And spoof login web pages, where they hope you will enter real login details in error.

If you have an IT support partner already, speak with them to make sure all of your systems are fully up-to-date and patched as necessary.

They can also help you to audit how well you’re performing with the items above, and get a plan in place to help you respond to an attack or attempted attack.

If you don’t have an IT support partner – or you feel your current one isn’t able to help you with your data security, we can help. Call us.

Published with permission from Your Tech Updates.