Security tips - protect your data and systems

Keeping your data and systems safe: These ‘bread-and-butter’ security measures will deter most attackers

By Keren Lerner
10th February 2020

Ever got a newsletter that makes sense and seems really useful? We did, from Michael Strelitz who runs Datasafe, an IT and Comms managed services. Their slogan is “Not in the clouds – but down to earth!”

Read on for Michael’s tips!

(Photo by Sydney Troxell from Pexels)

We are inundated with accounts of computer systems being hacked, of crypto viruses infecting files, of personal data being released on the Internet, etc. These risks are real and relevant and generate well-grounded anxieties

  • Are we doing enough to prevent our systems from being attacked?
  • What more can we do?
  • Should we employ the services of data security experts?
  • Who can help me?
  • Can I afford it?
  • Can I not afford it?

Trend Micro, purveyors of computer and related security software, have researched the issue. They set up a sophisticated ‘honeypot’ that mimicked the computer and related systems of a small specialist manufacturing company. They also made the company easy to find on the internet – something every business wants.

It was clear from their experience that even basic security measures kept attackers from infiltrating the honeypot.

To lure attackers, they then left various external access ‘ports’ open. Only then was the system infected with a cryptovirus. This attack, as well as the many others subsequently received, were not from fiendishly clever criminals, but from mundane opportunist exploiters.

The conclusion we draw is that SMEs can protect themselves, by and large, by following a number of standard rules:

  • Keeping operating systems up to date
  • Keeping routers, firewalls and web browsers and other software up to date and especially anti-virus software
  • Ensuring that passwords are not default, common or simple
  • Ensuring that routers only allow authorised connections in (and out)
  • Safe browsing
  • Not opening attachments that don’t come from someone you know and that you don’t expect
  • Not clicking on email or website urls without checking that the url address matches the reason for making the click
  • Not allowing/opening ‘stranger’ memory sticks
    Being careful to check (and double check) who you share credentials with – the default is no-one!

If you have any issue implementing these protection mechanisms in your organisation – particularly in keeping up to date – please don’t hesitate to phone us at DataSafe Services.

Kind regards
Michael Strelitz
020 7607 2262

Share this article

Visit Us On TwitterVisit Us On FacebookVisit Us On PinterestVisit Us On YoutubeVisit Us On Linkedin

About the Editor

Keren Lerner
Keren Lerner is the founder of TLD and came up with the idea of this blog, which is used to show different types of blogs, for training and placing interesting topics and stories. All the posts on this site are edited by Keren but often you will see the credit is from someone else.