{"id":4025,"date":"2020-11-10T16:35:22","date_gmt":"2020-11-10T16:35:22","guid":{"rendered":"https:\/\/ngx273.inmotionhosting.com\/~n7432d5\/news\/?p=4025"},"modified":"2020-11-18T15:44:18","modified_gmt":"2020-11-18T15:44:18","slug":"10-most-common-cybersecurity-mistakes-businesses-make","status":"publish","type":"post","link":"https:\/\/cardonet.com\/news\/10-most-common-cybersecurity-mistakes-businesses-make\/","title":{"rendered":"10 Most Common Cybersecurity Mistakes Businesses Make"},"content":{"rendered":"\n<p class=\"has-medium-font-size\">With businesses today relying almost completely on virtual operations, <strong>defending your business against cyber-attacks is a business-critical task<\/strong>. The research firm Cybersecurity Ventures estimates that by 2021, the cost of cyber-crime will cross $6 trillion annually, worldwide. Whether your business employs 4, 40 or 400 people, you could be at risk from cyber-attacks: The National Cyber Security Alliance reports that one in five small businesses have been victims of cybercrime in the last year. Here are 10 common mistakes that businesses make that leave them vulnerable to cyber-attacks<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Weak Passwords<\/h3>\n\n\n\n<p>Weak passwords are easily hacked. Your company should have an IT policy which requires strong, complex passwords. This means passwords of at least eight characters with a combination of uppercase and lowercase letters, numbers and special characters. Users should be required to change their password after a certain period of time and previous passwords should not be re-used. Employees should be reminded never to write their passwords down and not to share them with anyone else.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Poorly Trained Employees<\/h3>\n\n\n\n<p>One of the most important aspects of keeping your business safe is empowering your employees to use technology safely. Train them in company security policy; for example, creating strong passwords and changing them every 30 days and reminding them of procedures for encrypting personal data. Employees should also be trained in recognising potential malicious links and phishing attacks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Not Backing Up Data<\/h3>\n\n\n\n<p>Backing up your data in multiple places is crucial. Once you\u2019ve identified the data that needs to be backed up, particularly sensitive data that could fall under GDPR or CCPA, you must implement backups regularly. If your business has already migrated to the cloud, backing up your data is not an onerous task. However, the cloud is still vulnerable to data loss or hacking so it is a good idea to have a local backup. The strongest protection comes from following the <a href=\"https:\/\/cardonet.com\/news\/the-3-2-1-rule-of-backup\/\">3-2-1 rule<\/a>: keep at least&nbsp;<strong>3<\/strong>&nbsp;copies of your data, store&nbsp;<strong>2<\/strong>&nbsp;backup copies on different storage media, with&nbsp;<strong>1<\/strong>&nbsp;of them being offsite.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. No Acceptable Use Policy<\/h3>\n\n\n\n<p>Your business should have a strong acceptable use policy. You can set up permissions that limit what websites employees can access from company issued devices. You can also detail what can and cannot be accessed from personal devices. Limiting administrative capabilities is also a good idea; not every employee needs to have access to all the information and data your business stores. The fewer people who have access to sensitive information, the smaller the risk of a data breach.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Unpatched Networks<\/h3>\n\n\n\n<p>If your networks are not patched, they can be exposed to new vulnerabilities which can be exploited by hackers. Taking the time to update your software means that you always have access to the newest, strongest security features available. Additionally, keeping your anti-virus software updated is critical to ensuring that you have the best technology protecting your business.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. Public WiFi<\/h3>\n\n\n\n<p>With many people working remotely, it is difficult to ensure that everyone is using a safe and secure internet connection. Using public WiFi can be risky as hackers will exploit the lack of security. Employees should be using a secured home network and should never access sensitive company information from public WiFi networks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">7. No Firewall<\/h3>\n\n\n\n<p>A strong firewall is an important factor in cyber defence. A firewall is a network security device which monitors your network traffic and protects it from viruses and malicious code. It can also stop users from accessing certain external sites.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">8. Unmonitored\/ Unmaintained Firewall<\/h3>\n\n\n\n<p>Having a firewall is all good and well, but, like any other device, it requires maintenance. A weak, unmonitored firewall isn\u2019t much good. Your IT provider usually monitors and maintains your firewall as part of their regular, routine maintenance.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">9. Phishing<\/h3>\n\n\n\n<p>Phishing emails work, which is why they are used so frequently by cyber criminals. They work by getting you to click a link, download a virus or enter personal details. Over the years, hackers have become more and more professional so they can look legitimate. Training employees to recognise a phishing attack is vital.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">10. Social Engineering<\/h3>\n\n\n\n<p>Social engineering is when hackers pose as someone you know, or a trusted organisation, in order to gather personal details. It also works well so remind your employees never to open an email that looks even slightly off and never to click links, or download attachments, unless they are 100% certain who sent them.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>Cardonet can provide you with a comprehensive range of cyber security services to help you stay secure and, at the same time, help you demonstrate compliance with industry and regulatory standards. To find out more about our Cyber Security Services, please&nbsp;<a href=\"https:\/\/www.cardonet.com\/cyber-security-services-business.php\">click here<\/a>.<\/p>\n\n\n\n<p>If you are concerned about cyber attacks and how it could affect your business,&nbsp;<strong>&nbsp;call us on&nbsp;<\/strong><a href=\"tel:+442030342244\"><strong>+44 203 034 2244<\/strong><\/a><strong>&nbsp;or&nbsp;<\/strong><a href=\"tel:+13239848908\"><strong>+1 323 984 8908<\/strong><\/a><strong>&nbsp;Alternately, you can&nbsp;<\/strong><a href=\"https:\/\/www.cardonet.co.uk\/contact-it-services.php\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>contact us online<\/strong><\/a><strong>. We will be happy to help you overcome your hotel IT challenges so that you can improve your guest experience and set your hotel apart.&nbsp;<\/strong>Cardonet have been&nbsp;working with businesses&nbsp;for the past twenty years to help them overcome their technological challenges. We have engineering bases in the United Kingdom, Europe and Southern California and our group of highly experienced engineers are available 24\/7 to assist and ensure that your IT infrastructure is secure and running seamlessly.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With businesses today relying almost completely on virtual operations, defending your business against cyber-attacks is a business-critical task. The research firm Cybersecurity Ventures estimates that by 2021, the cost of cyber-crime will cross $6 trillion annually, worldwide. Whether your business employs 4, 40 or 400 people, you could be at risk from cyber-attacks: The National<\/p>\n","protected":false},"author":4,"featured_media":4026,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[520],"tags":[558,690,720,682,610,700],"class_list":["post-4025","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-business","tag-business-continuity","tag-cyber-awareness","tag-cyber-security","tag-it-infrastructure","tag-phishing-scams"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>10 Cybersecurity Mistakes Your Business Must Avoid<\/title>\n<meta name=\"description\" content=\"Many businesses commonly make these 10 cybersecurity mistakes. Here&#039;s what you should do to avoid making them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cardonet.com\/news\/10-most-common-cybersecurity-mistakes-businesses-make\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Cybersecurity Mistakes Your Business Must Avoid\" \/>\n<meta property=\"og:description\" content=\"Many businesses commonly make these 10 cybersecurity mistakes. Here&#039;s what you should do to avoid making them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cardonet.com\/news\/10-most-common-cybersecurity-mistakes-businesses-make\/\" \/>\n<meta property=\"og:site_name\" content=\"News\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-10T16:35:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-18T15:44:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cardonet.com\/news\/wp-content\/uploads\/2020\/11\/10-cybersecurity-mistakes.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"334\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rachael\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rachael\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 Cybersecurity Mistakes Your Business Must Avoid","description":"Many businesses commonly make these 10 cybersecurity mistakes. Here's what you should do to avoid making them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cardonet.com\/news\/10-most-common-cybersecurity-mistakes-businesses-make\/","og_locale":"en_US","og_type":"article","og_title":"10 Cybersecurity Mistakes Your Business Must Avoid","og_description":"Many businesses commonly make these 10 cybersecurity mistakes. Here's what you should do to avoid making them.","og_url":"https:\/\/cardonet.com\/news\/10-most-common-cybersecurity-mistakes-businesses-make\/","og_site_name":"News","article_published_time":"2020-11-10T16:35:22+00:00","article_modified_time":"2020-11-18T15:44:18+00:00","og_image":[{"width":600,"height":334,"url":"https:\/\/cardonet.com\/news\/wp-content\/uploads\/2020\/11\/10-cybersecurity-mistakes.jpg","type":"image\/jpeg"}],"author":"Rachael","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rachael","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cardonet.com\/news\/10-most-common-cybersecurity-mistakes-businesses-make\/#article","isPartOf":{"@id":"https:\/\/cardonet.com\/news\/10-most-common-cybersecurity-mistakes-businesses-make\/"},"author":{"name":"Rachael","@id":"https:\/\/cardonet.com\/news\/#\/schema\/person\/c62d005dc8af343ee7e1eeeb323cdf35"},"headline":"10 Most Common Cybersecurity Mistakes Businesses Make","datePublished":"2020-11-10T16:35:22+00:00","dateModified":"2020-11-18T15:44:18+00:00","mainEntityOfPage":{"@id":"https:\/\/cardonet.com\/news\/10-most-common-cybersecurity-mistakes-businesses-make\/"},"wordCount":889,"commentCount":0,"publisher":{"@id":"https:\/\/cardonet.com\/news\/#organization"},"image":{"@id":"https:\/\/cardonet.com\/news\/10-most-common-cybersecurity-mistakes-businesses-make\/#primaryimage"},"thumbnailUrl":"https:\/\/cardonet.com\/news\/wp-content\/uploads\/2020\/11\/10-cybersecurity-mistakes.jpg","keywords":["Business","Business Continuity","Cyber Awareness","Cyber Security","IT infrastructure","Phishing Scams"],"articleSection":["Cyber Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cardonet.com\/news\/10-most-common-cybersecurity-mistakes-businesses-make\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cardonet.com\/news\/10-most-common-cybersecurity-mistakes-businesses-make\/","url":"https:\/\/cardonet.com\/news\/10-most-common-cybersecurity-mistakes-businesses-make\/","name":"10 Cybersecurity Mistakes Your Business Must Avoid","isPartOf":{"@id":"https:\/\/cardonet.com\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cardonet.com\/news\/10-most-common-cybersecurity-mistakes-businesses-make\/#primaryimage"},"image":{"@id":"https:\/\/cardonet.com\/news\/10-most-common-cybersecurity-mistakes-businesses-make\/#primaryimage"},"thumbnailUrl":"https:\/\/cardonet.com\/news\/wp-content\/uploads\/2020\/11\/10-cybersecurity-mistakes.jpg","datePublished":"2020-11-10T16:35:22+00:00","dateModified":"2020-11-18T15:44:18+00:00","description":"Many businesses commonly make these 10 cybersecurity mistakes. Here's what you should do to avoid making them.","breadcrumb":{"@id":"https:\/\/cardonet.com\/news\/10-most-common-cybersecurity-mistakes-businesses-make\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cardonet.com\/news\/10-most-common-cybersecurity-mistakes-businesses-make\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cardonet.com\/news\/10-most-common-cybersecurity-mistakes-businesses-make\/#primaryimage","url":"https:\/\/cardonet.com\/news\/wp-content\/uploads\/2020\/11\/10-cybersecurity-mistakes.jpg","contentUrl":"https:\/\/cardonet.com\/news\/wp-content\/uploads\/2020\/11\/10-cybersecurity-mistakes.jpg","width":600,"height":334,"caption":"Cybersecurity Mistakes"},{"@type":"BreadcrumbList","@id":"https:\/\/cardonet.com\/news\/10-most-common-cybersecurity-mistakes-businesses-make\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"News Home","item":"https:\/\/cardonet.com\/news\/"},{"@type":"ListItem","position":2,"name":"10 Most Common Cybersecurity Mistakes Businesses Make"}]},{"@type":"WebSite","@id":"https:\/\/cardonet.com\/news\/#website","url":"https:\/\/cardonet.com\/news\/","name":"News","description":"IT Services from Cardonet","publisher":{"@id":"https:\/\/cardonet.com\/news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cardonet.com\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cardonet.com\/news\/#organization","name":"Cardonet","url":"https:\/\/cardonet.com\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cardonet.com\/news\/#\/schema\/logo\/image\/","url":"https:\/\/cardonet.com\/news\/wp-content\/uploads\/2018\/06\/it-support-london-cardonet.png","contentUrl":"https:\/\/cardonet.com\/news\/wp-content\/uploads\/2018\/06\/it-support-london-cardonet.png","width":1920,"height":1080,"caption":"Cardonet"},"image":{"@id":"https:\/\/cardonet.com\/news\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cardonet.com\/news\/#\/schema\/person\/c62d005dc8af343ee7e1eeeb323cdf35","name":"Rachael","sameAs":["http:\/\/www.cardonet.com"]}]}},"_links":{"self":[{"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/posts\/4025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/comments?post=4025"}],"version-history":[{"count":0,"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/posts\/4025\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/media\/4026"}],"wp:attachment":[{"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/media?parent=4025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/categories?post=4025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/tags?post=4025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}