{"id":1868,"date":"2022-05-31T08:58:16","date_gmt":"2022-05-31T08:58:16","guid":{"rendered":"https:\/\/www.nebrcentre.co.uk\/?p=1868"},"modified":"2022-05-31T08:58:16","modified_gmt":"2022-05-31T08:58:16","slug":"cyber-security-tips","status":"publish","type":"post","link":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/cyber-security-tips\/","title":{"rendered":"Cyber Security Tips"},"content":{"rendered":"\n<p>To&nbsp;help&nbsp;reduce the threats of a cyber security breach&nbsp;here are&nbsp;some&nbsp;basic IT&nbsp;hygiene&nbsp;rules that&nbsp;all&nbsp;businesses should be following:<\/p>\n\n\n\n<p>\u27a2&nbsp;<strong>Passwords and MFA&nbsp;<\/strong><\/p>\n\n\n\n<p>Ensure&nbsp;all&nbsp;employees&nbsp;create and use&nbsp;strong passwords. Using&nbsp;a password management tool and&nbsp;multifactor authentication (MFA)&nbsp;will also help add an extra layer of protection.<\/p>\n\n\n\n<p>\u27a2&nbsp;<strong>Network firewalls<\/strong><\/p>\n\n\n\n<p>Any business with a network should have&nbsp;a firewall&nbsp;as standard.&nbsp;It\u2019s good practice to ensure your&nbsp;firewall&nbsp;not only&nbsp;monitors what is going in and out of your network, but also can inspect the content.<\/p>\n\n\n\n<p>\u27a2&nbsp;<strong>Data backup<\/strong><\/p>\n\n\n\n<p>If breached,&nbsp;you&nbsp;need to be able to&nbsp;recover data&nbsp;from a secure back&nbsp;up program in place.&nbsp;The cyber security&nbsp;sector&nbsp;is moving towards isolated network backups&nbsp;via an&nbsp;\u201cair gap\u201d between the network and the backup network&nbsp;so businesses have a secure Plan B if locked out of their network and data.<\/p>\n\n\n\n<p>\u27a2&nbsp;<strong>Vulnerability<\/strong><strong>&nbsp;testing<\/strong><\/p>\n\n\n\n<p>Use regular testing to identify vulnerabilities within your network.&nbsp;Experts will be able to identify&nbsp;any&nbsp;anomalies&nbsp;within your network that may leave you exposed.&nbsp;<\/p>\n\n\n\n<p>\u27a2&nbsp;<strong>Practice your&nbsp;<\/strong><strong>I<\/strong><strong>ncident&nbsp;<\/strong><strong>R<\/strong><strong>esponse&nbsp;<\/strong><strong>P<\/strong><strong>lan<\/strong><\/p>\n\n\n\n<p>If\u00a0you have an\u00a0IR Plan,\u00a0make sure it doesn\u2019t gather dust in the drawer, if you do experience a breach you will want to know your processes and responses are up to date.<\/p>\n\n\n\n<p>\u27a2&nbsp;<strong>Employee engagement in cyber security<\/strong><\/p>\n\n\n\n<p>Ensure your employees are trained on how to spot attacks such as phishing emails. Regular tests&nbsp;by sending out false phishing emails&nbsp;will help to identify&nbsp;staff who click on the links&nbsp;and need further training.<\/p>\n\n\n\n<p>At the NEBRC, we work to educate and inspire organisations to understand the importance of having strong cyber security. That\u2019s why we offer a variety of services, including Vulnerability Assessments and Security Awareness Training to help businesses manage risks to their network.&nbsp;<\/p>\n\n\n\n<p>For more information, <strong><a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/core-membership-sign-up\/\">sign up<\/a> <\/strong>to our free Core Membership to gain access to a wealth of helpful resources at your fingertips, or <strong>contact us today for further information at:\u00a0<\/strong><a href=\"http:\/\/www.nebrecentre.co.uk\/\"><strong>crcnetwork-cfkr6.projectbeta.co.uk\/northeast\/<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>To&nbsp;help&nbsp;reduce the threats of a cyber security breach&nbsp;here are&nbsp;some&nbsp;basic IT&nbsp;hygiene&nbsp;rules that&nbsp;all&nbsp;businesses should be following: \u27a2&nbsp;Passwords and MFA&nbsp; Ensure&nbsp;all&nbsp;employees&nbsp;create and use&nbsp;strong passwords. Using&nbsp;a password management tool&#8230;<\/p>\n","protected":false},"author":1,"featured_media":7563,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[13],"tags":[],"class_list":["post-1868","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"acf":[],"_links":{"self":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/posts\/1868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/comments?post=1868"}],"version-history":[{"count":0,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/posts\/1868\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/media?parent=1868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/categories?post=1868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/tags?post=1868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}