Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Tech firms utilising simple tricks to protect from cyber attacks

5/07/2016 by Usha Tyagi

W1siziisijiwmtyvmdcvmduvmdkvmzavmjcvotk3l0n5ymvyifnly3vyaxr5lmpwzyjdlfsiccisinrodw1iiiwinjawedqwmfx1mdazzsjdxq

Incidence rates for cybercrimes are on the rise, and it means that associated risks are also climbing. For example, a hospital located in Washington, DC experienced a breach on its core system that pushed the facility back to a paper-based era. To combat the problem of cybercrime, companies around the world are increasingly utilising intelligence and innovative safeguards to protect themselves from attack and limit the fallout when breaches occur. For tech firms, there are three easy tricks to significantly boost protection.

The first trick is to regularly conduct password resets. Though this might seem obvious, studies have found that some companies do not even change the default logins provided when software is installed, leaving them extremely vulnerable to attack. Many modern programs actually require a password to be changed every few months. However, a report from SoftwareAdvice.com said: “Only 56 percent of employees surveyed are confident that their password usage habits in the workplace are secure.”

To increase password strength, companies can use a random password generator that updates and stores logins in a cloud system. This makes it easier for employees to use passwords that are hard to remember.

The second trick to help secure networks is to use VPN services to safeguard data transmissions. Antivirus software was created to stop thieves hacking computers, but many people forget that criminals want to access data, and this information isn’t held on computers but is transmitted around the world whenever people connect to the internet. This gives an opportunity not only to track data but also to intercept and steal it. By using modulating IP VPN services, internet IP addresses are changed every time the internet is accessed. This makes tracking data flow increasingly difficult.

Finally, technology companies also use clean state computer reboots. In the past, many computers running on Vista and Windows XP would boot using a Windows SteadyState feature. This meant that systems were restored from a previously saved state so that any rogue software or program that had installed itself was effectively stripped away. Modern defence systems include Steadier State and Reboot Restore RX.

Protecting against cybercrime is extremely important, and many companies invest huge amounts of money to shore up their safeguards and protect against attacks. However, some of the best practices are simple tricks that cost very little, and if these steps are used, cybersecurity measures can be greatly enhanced.

 

 

 

 

About Us

Montash is a multi-award winning global technology recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP Recruitment, BI & Data Recruitment, Information Security Recruitment, Enterprise Architecture & Strategy Recruitment , Energy Technology Recruitment, Demand IT and Business Engagement Recruitment, Digital and E-commerce Recruitment, Leadership Talent, Infrastructure and Service Delivery Recruitment, Project and Programme Delivery Recruitment.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmtgvmtavmtivndyvodeyl1dvbwvuigluihrly2ggkdiplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Tech is for girls... and always has been!

2017-09-18 10:00:00 +0100

Today, it's hard to deny that the IT and tech industry is a male-dominated field. Women earn only 28%[1] of computer science degrees, while the quit rate for women in the high tech industry is 41%[2], twice as high as it is for men. These two statistics would suggest that perhaps women aren't just discouraged from entering the tech field, but may find it a challenging environment to work in both in terms of treatment and pay. Facebook chief operating of...

W1siziisijiwmtcvmdkvmdgvmtevmtuvmzqvmtgwl0hpcmluzybnaxn0ywtlcy5qcgcixsxbinailcj0ahvtyiisijm4mhgxmdajil1d

Common Hiring Mistakes for SAP Consultants

2017-09-08 12:00:00 +0100

Choosing the wrong consultant can lead a project down a ruinous path. Deadlines get missed, quality of work decreases and money is wasted. When you're putting together a new SAP project, getting the right talent is paramount. We discussed hiring mistakes with our Senior Business Manager, Adam Blaney and asked him the question of how to minimise risk in hiring SAP Consultants. “Hiring any form of technology based consultant is difficult. The hardest part...