{"id":3777,"date":"2025-02-02T14:20:00","date_gmt":"2025-02-02T14:20:00","guid":{"rendered":"https:\/\/www.nebrcentre.co.uk\/?p=3777"},"modified":"2025-02-02T14:20:00","modified_gmt":"2025-02-02T14:20:00","slug":"how-to-protect-your-employees-from-cyber-threats","status":"publish","type":"post","link":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/how-to-protect-your-employees-from-cyber-threats\/","title":{"rendered":"How to Protect Your Employees from Cyber Threats"},"content":{"rendered":"\n<p>According\u202fto \u202f<a href=\"https:\/\/spycloud.com\/resource\/spycloud-annual-identity-exposure-report-2024\/\" target=\"_blank\" rel=\"noreferrer noopener\">SpyCloud\u2019s\u202fAnnual Identity Exposure Report<\/a>,\u202f74% of people continue to reuse old passwords, including login details that have been stolen in cyber breaches. Your organisation\u202fcould be vulnerable to\u202fcyber-attacks\u202fenabled through breached employee passwords, being used to try and access your business accounts, protecting your employee login credentials not only safeguards your sensitive data but also builds trust with customers and stakeholders.&nbsp;<br>&nbsp;<br>You can help by educating employees\u202fon how they can stay safe online by&nbsp;<\/p>\n\n\n\n<p>1)\u202f<strong>Incorporating MFA Wherever Possible<\/strong>&nbsp;<\/p>\n\n\n\n<p>Multifactor Authentication (MFA) should be part of your authentication process . This adds an additional layer of security, making it harder for a third party to access confidential data.<s>.<\/s>&nbsp;<\/p>\n\n\n\n<p>2)\u202f<strong>Using Password Managers<\/strong>&nbsp;<\/p>\n\n\n\n<p>Ensure that your employees use strong passwords, password managers are a great way of achieving strong passwords across multiple accounts, by reducing the password burden placed on users<\/p>\n\n\n\n<p>3)\u202f<strong>Educating Employees on Threat Detection<\/strong>&nbsp;<\/p>\n\n\n\n<p>Awareness training help employees spot, phishing emails and empowers them to know what do and how to report phishing attempts when they encounter them.\u00a0<\/p>\n\n\n\n<p>4)\u202f<strong>Establish a Cyber Security Policy<\/strong>&nbsp;<\/p>\n\n\n\n<p>A well-defined cybersecurity policy provides employees with guidelines on best practices and expected behaviour when handling company data. They are also useful to show third parties how you handle data and are a vital part of cybersecurity audits.&nbsp;<\/p>\n\n\n\n<p><strong>For further guidance on protecting your business and employees from cyber\u202fcriminals, or for help with any of the above measures please contact\u202f<\/strong><a href=\"mailto:enquiries@nebrcentre.co.uk\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>enquiries@nebrcentre.co.uk<\/strong><\/a><strong>.<\/strong>&nbsp;<\/p>\n\n\n\n<p>To\u202f<a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/news\/\" target=\"_blank\" rel=\"noreferrer noopener\">stay up to date<\/a>\u202fwith the\u202fever-changing digital landscape and security threats, sign up for our\u202f<a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/core-membership-sign-up\/\" target=\"_blank\" rel=\"noreferrer noopener\">free core membership.<\/a>&nbsp;<\/p>\n\n\n\n<p><strong>The\u202f<\/strong><a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>NEBRC<\/strong><\/a><strong>\u202fis a non-profit organisation that seeks to\u202f<\/strong><a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/resources\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>educate<\/strong><\/a><strong>, inform, and\u202f<\/strong><a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/services\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>support<\/strong><\/a><strong>\u202fbusinesses across the UK on\u202fstaying protected against online threats through strong cyber security practices.<\/strong>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According\u202fto \u202fSpyCloud\u2019s\u202fAnnual Identity Exposure Report,\u202f74% of people continue to reuse old passwords, including login details that have been stolen in cyber breaches. Your organisation\u202fcould be&#8230;<\/p>\n","protected":false},"author":1,"featured_media":3778,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[13],"tags":[],"class_list":["post-3777","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"acf":[],"_links":{"self":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/posts\/3777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/comments?post=3777"}],"version-history":[{"count":0,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/posts\/3777\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/media?parent=3777"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/categories?post=3777"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/tags?post=3777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}