The Role of Cyber Hygiene in Combating the Growing Cybercrime Epidemic
In the face of the escalating cybercrime epidemic, there are valuable lessons we can learn from epidemiology. Just as we practice good basic hygiene to prevent the spread of germs, implementing simple cyber hygiene measures can deter cybercriminals and mitigate the proliferation of cybercrime.
The Power of Cyber Hygiene
Similar to the importance of handwashing in preventing the spread of bacteria and viruses, more than 80 percent of cybercrimes can be prevented through basic cyber hygiene practices. By adopting simple measures, businesses can significantly reduce their vulnerability to cyber threats.
Addressing the Cause and Symptoms Together
While insurance is undoubtedly crucial, it is more effective to address both the cause and symptoms of cybercrime. Major systemic attacks may not be covered by insurance, highlighting the significance of prevention as the ultimate defense.
Identifying Common Cyber Security Shortcomings
In September, we introduced an interactive tool specifically designed for SMEs to assess their cybersecurity and identify any vulnerabilities. Through the analysis of hundreds of businesses that have already taken the test, we have identified the five most common cyber security shortcomings:
- Lack of control over remote devices: It is vital for businesses to be able to locate, control, and remotely wipe devices if necessary. This can be easily achieved through user-friendly and free-to-download apps.
- Inadequate disaster recovery plans: Even if businesses have a plan for responding to cyber incidents, they often fail to keep it up to date or regularly test it. Free government exercises are available to assist businesses in this essential practice.
- Lack of employee awareness: It cannot be assumed that employees are knowledgeable about current cybercrime trends. Regularly running free training programs offered by the National Cyber Security Centre can help keep teams well-informed and vigilant against the latest threats.
- Loose access protocols: Decisions regarding software and data access should never be taken lightly. Care should be exercised not only with current staff but also with past employees to ensure strict control over access privileges.
- Vulnerabilities in Internet Protocol (IP) addresses: Cyber criminals can exploit undiscovered vulnerabilities in IP addresses. Free online tools are available for businesses to test their addresses and address any security issues.
Discover and Address Your Own Cyber Shortcomings
We strongly recommend that you take three minutes to use our cyber safety tool to identify your own top five cyber security shortcomings. By utilizing the associated solutions, you can enhance your business’s security and safeguard against potential cyber threats.
Mark Shepherd, Head of General Insurance Policy at the Association of British Insurers (ABI).
Further Reading
How to Provide Cybersecurity Training for Your Home Workers – Learn about essential cybersecurity training information, effective delivery methods, and valuable follow-up resources for your remote workforce.
How to Choose a Cybersecurity Solution for Your Small Business – With a rising frequency of cyberattacks, it is crucial for small businesses to select the right cybersecurity solution. Discover key considerations and best practices.
Cyber Security and Data Protection for SMEs – A Podcast with the Experts – Gain insights from experts in this enlightening podcast by the UK Domain. Explore invaluable advice on cyber security and data protection tailored to small businesses.