Give your enterprise the ultimate cybersecurity makeover during Cyber Security Awareness Month

By Becky Lawlor

| Banking

Despite the recent cyberattacks in the news, 52 percent of IT decision-makers say their company’s enforcement of cybersecurity policies is only moderate, according to a recent security survey by Clutch.

In honor of National Cyber Security Awareness Month, now is a good time to take stock of your organization’s security and give it a makeover, where needed. Here are a few simple tips to get you started:

1. Beef up your password security

According to Clutch, 37 percent of companies say they’ve experienced password attacks in the past year. Passwords such as “admin” just aren’t going to cut it anymore.

To better protect your data and save your company from embarrassment, you need to enforce password security in your organization. This includes insisting employees use unique passwords for all devices and any password-protected applications. If employees balk at trying to remember complicated passwords, suggest a password manager app to help. These apps can sync between mobile and desktop for a seamless user experience.

2. Use two-factor authentication

When it comes to cybersecurity, more is always better. Instead of just requiring a password or PIN to access a mobile device, two-factor authentication requires one more step of security, such as fingerprints, facial scans or other biometric logins. Another two-factor authentication method involves pushing out a one-time code to end users’ mobile devices. This can be handy for both mobile and desktop apps that demand more security.

Download Gartner report on managed mobility services

3. Install anti-malware software on all devices

Clutch reports 47 percent of IT decision-makers have experienced a Trojan or malware attack in the past 12 months. This isn’t an area where you can let down your guard. Make sure all company devices, including mobile devices such as laptops, tablets and smartphones, have reputable anti-malware software installed. The solution you use should be able to identify, quarantine, delete and report any suspicious activity. For an even more security-minded solution, look for anti-malware software that offers a suite of services, including firewall and encryption options.

4. Keep your software updated

The Clutch study notes 25 percent of companies reported attacks due to outdated software in the past year. Though this is not as high of a number as other security threats, it’s still significant enough that you shouldn’t let outdated software be swept under the rug. After all, CNN reports last spring’s WannaCry ransomware hit around 300,000 computers globally because they were running outdated software.

Sign up for our newsletter
Stay on top of the latest mobile news and insights.

To avoid being vulnerable to ransomware, set up automatic updates where possible, including employees’ mobile devices. Using a mobile device management or enterprise mobility management solution will allow you to do this remotely and push out updates to devices either on an automated or as-needed basis. One of the biggest benefits will be the ability to bypass relying on users to either set up automatic updates or do it themselves.

5. Back up your devices and data

Making sure your company’s data is protected can help shield you against ransomware attacks, lost or stolen devices or hardware failures. Backups should be scheduled regularly so critical data isn’t lost. Using a cloud service that can automate backups of employees’ devices will make this even simpler.

At the end of the day, good security depends on making sure you have your bases covered on multiple fronts. However, it also relies on engaging employees to do their part. Whatever makeovers you apply to your security policies, make sure you enforce them and employees know about these updates.

Written By

Becky Lawlor

Technology Writer

Becky Lawlor is a freelance technology writer specializing in mobility, cloud computing, unified communications and collaboration solutions. She develops and writes content that helps technology buyers understand and evaluate technology solutions, modernize their IT infrastructure…

Other Articles by Becky Lawlor
See All Posts