This document discusses cyber security threats facing businesses and tools that can help reduce risks. It outlines common cyber threats like malware, ransomware, and unsecured networks. It recommends security best practices like strong passwords, two-factor authentication, staff training, and regular backups. The document also introduces cybersecurity and cloud-based tools that can help businesses with storage, collaboration, project management, and disaster recovery planning.
4. CYBERTHREATS
People – you, your staff, contractors and others
Malware
Ransomware
Unsecure networks
Out of date or unpatched software
Connected devices (the Internet ofThings)
5.
6.
7.
8.
9.
10. REDUCING CYBER RISK
Strong passwords
Two-step authentication
Staff awareness and training
Restrict access to data
BYOD policy - enforced
Be cautious of emails, links and attachments
Be aware of personal information on social media
11. REDUCING CYBER RISK
SecureWIFI – separate guest access
Regular offline back-up
Security software – all work devices
Consider cyber insurance
Data use – what and how long?
Be prepared for the worst – have a plan
13. TOOLS
Can save you time, money and stress
Allow real-time collaboration
Can provide flexibility and easy scalability
Cloud based – access remotely
Integration with website, suppliers and others
21. WRAP UP ANDTAKEAWAYS
Free digital resources.
WRAP UP
Where to next?
RICHARD HOLSTEIN
Business Development & Projects
richard@digitaljourney.org / 021 807 878
LinkedIn: richardjholstein
www.digitaljourney.org