{"id":1104,"date":"2021-10-28T00:00:00","date_gmt":"2021-10-27T22:00:00","guid":{"rendered":""},"modified":"2025-08-15T12:00:24","modified_gmt":"2025-08-15T10:00:24","slug":"10-cyber-security-tips","status":"publish","type":"post","link":"https:\/\/www.domains.co.za\/blog\/10-cyber-security-tips\/","title":{"rendered":"10 Cyber Security Tips for Businesses &amp; WFH Employees"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div>\n<p>It\u2019s <a href=\"https:\/\/www.domains.co.za\/blog\/prioritising-cyber-security-is-critical\/\" alt=\"Link to Domains.co.za Blog - Why Prioritising Cyber Security is Critical to Your Business\" title=\"Domains.co.za - Why Prioritising Cyber Security is Critical to Your Business\" target=\"_blank\" rel=\"noopener\">National Cyber Security Awareness Month<\/a> but in truth, recognition of this growing hazard should take precedence every day. South Africa experiences the third highest number of cybercrime attacks in the world, suffering 577 malware attacks every hour. Companies need to intensify their defence strategies. Unfortunately, with most of the attacks focussed on employees, a company\u2019s mitigation protocols are only as strong as their \u2018weakest\u2019 link.<\/p>\n\n\n\n<p>Here are our top 10 cyber security tips to protect your business and your remote workforce from the digital age\u2019s biggest threat!<\/p>\n\n\n\n<div class=\"wp-block-rank-math-toc-block\" id=\"rank-math-toc\"><h4>TABLE OF CONTENTS<\/h4><nav><ul><li><a href=\"#cyber-security-tips-for-businesses\">Cyber Security Tips for Businesses<\/a><ul><li><a href=\"#1-implement-a-cyber-security-strategy-for-in-house-and-remote-working-employees\">1. Implement a cyber security strategy for in-house and remote-working employees<\/a><\/li><li><a href=\"#2-train-employees-regularly-review-security-awareness\">2. Train employees regularly &amp; review security awareness <\/a><\/li><li><a href=\"#3-appoint-a-security-officer-to-take-the-lead\">3. Appoint a security officer to take the lead<\/a><\/li><li><a href=\"#4-create-best-practice-policies\">4. Create best practice policies <\/a><\/li><\/ul><\/li><li><a href=\"#cyber-security-tips-for-employees-working-from-home-wfh\">Cyber Security Tips for Employees Working from Home (WFH)<\/a><ul><li><a href=\"#1-create-strong-passwords\">1. Create strong passwords<\/a><\/li><li><a href=\"#2-corporate-equipment-is-for-employee-use-only\">2.\u00a0 Corporate equipment is for employee use only<\/a><\/li><li><a href=\"#3-secure-home-wi-fi-router-passwords\">3. Secure home WiFi router passwords<\/a><\/li><li><a href=\"#4-run-software-and-web-application-updates\">4. Run software and web application updates <\/a><\/li><li><a href=\"#5-dont-use-public-wi-fi-for-work\">5. Don\u2019t use public WiFi for work<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"cyber-security-tips-for-businesses\">Cyber Security Tips for Businesses<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"1-implement-a-cyber-security-strategy-for-in-house-and-remote-working-employees\">1. Implement a cyber security strategy for in-house and remote-working employees<\/h4>\n\n\n\n<p>Defend your data assets and networks by obtaining the answers for the following questions:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Who has access to it?<\/li>\n\n\n\n<li>How can our data-assets be compromised?<\/li>\n\n\n\n<li>What steps can we take to prevent an attack?<\/li>\n\n\n\n<li>What steps can be taken in the event of a successful attack?<\/li>\n<\/ol>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"2-train-employees-regularly-review-security-awareness\">2. Train employees regularly review security awareness<\/h4>\n\n\n\n<p>Cyber criminals are creative and therefore the type of attacks are continuously evolving in order to succeed. All it takes is one careless click from an unsuspecting employee that can send your entire security barrier crumbling. Cyber security training should be an on-going approach, and testing your employees&#8217; online security awareness and knowledge is paramount.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"3-appoint-a-security-officer-to-take-the-lead\">3. Appoint a security officer to take the lead<\/h4>\n\n\n\n<p>For any strategy to succeed you need someone with the skill set to run with it. This person will be involved in all aspects of your business\u2019 cyber security, ensuring that employees are well trained and informed about every potential threat.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"4-create-best-practice-policies\">4. Create best practice policies<\/h4>\n\n\n\n<p>Make cyber security protocol a legal policy! This way you can ensure your employees realise the seriousness of addressing their cyber security awareness and knowledge. They need to be able to always act responsibly when accessing corporate networks and using corporate equipment at the office or at home.<\/p>\n\n\n\n<p>5<strong>. Install antivirus software on corporate equipment<\/strong><\/p>\n\n\n\n<p>Ensure that all your employees have company-specified Antivirus software installed on their corporate equipment, whether at the office or at home. Send out reminders to employees to run the updates when they become available.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"cyber-security-tips-for-employees-working-from-home-wfh\">Cyber Security Tips for Employees Working from Home (WFH)<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"1-create-strong-passwords\">1. Create strong passwords<\/h4>\n\n\n\n<p>Sloppy password etiquette is behind the majority of cyber attacks. According to a <a href=\"https:\/\/www.lastpass.com\/resources\/reports\/psychology-of-passwords\" alt=\"Link to LastPass.com - Psychology of Passwords 2022\" title=\"LastPass.com - Psychology of Passwords 2022\" target=\"_blank\" rel=\"noopener\">LastPass research study<\/a>, which looked at the password behaviour of 3750 professionals in seven countries, 68% of people reused existing passwords out of the fear that they might forget them, and 35% did not see themselves as a target that hackers would be interested in.<\/p>\n\n\n\n<p class=\"has-text-align-left has-vivid-red-color has-text-color has-link-color has-small-font-size wp-elements-08c43d3e82e04226dcc0eb3877ba5c8d\"><strong>IMPORTANT: <\/strong>Create strong, unique and nonsensical passwords and activate multi-factor authentication.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"2-corporate-equipment-is-for-employee-use-only\">2.Corporate equipment is for employee use only<\/h4>\n\n\n\n<p>Staff may ask; What\u2019s the harm in allowing a teenager access to a work laptop for a school project? Or letting a spouse check his\/her emails quickly?<\/p>\n\n\n\n<p>It must be made very clear to them that &#8211; first off, <strong>it is against <\/strong><strong>company policy<\/strong>, and secondly, the members of their household did not receive the same cybersecurity training that they did, and they could be putting the entire company at risk.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"3-secure-home-wi-fi-router-passwords\">3. Secure home WiFi router passwords<\/h4>\n\n\n\n<p>Home WiFi routers often come with a preset password, which households use without thinking twice about. Or, in order to make it more memorable, families choose a simple password everyone will remember.<\/p>\n\n\n\n<p>Are your staff aware that hackers\u2019 can obtain access to their computers through their routers? They must make sure their WiFi router has a strong, unique password.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"4-run-software-and-web-application-updates\">4. Run software and web application updates<\/h4>\n\n\n\n<p>Web developers create updates in order to patch errors and remove any security vulnerabilities, with the goal being to improve the overall functionality of the software or app. Outdated web applications (social media, web email, WordPress etc.) and software programs (antivirus, Windows &amp; Mac OS, etc), including outdated plugins, open one up to risk. Ensure that your staff run all updates the moment they become available.<\/p>\n\n\n\n<p>Using WordPress? Consider <a href=\"https:\/\/www.domains.co.za\/wordpress-hosting\" alt=\"Link to Domains.co.za - WordPress Hosting\" title=\"Domains.co.za - WordPress Hosting\" target=\"_blank\" rel=\"noopener\">Domains.co.za\u2019s WordPress Hosting<\/a>. We run all updates on your behalf.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"5-dont-use-public-wi-fi-for-work\">5. Don\u2019t use public WiFi for work<\/h4>\n\n\n\n<p>Working from home often includes a trip to the local coffee shop to get away from the house for a bit and to gain inspiration from the different energy found there. Staff must not be tempted to use the public WiFi, as it is just too risky.<\/p>\n\n\n\n<p>Domains.co.za\u2019s is a local <a href=\"https:\/\/www.domains.co.za\/domain-registration\" alt=\"Link to Domains.co.za - Register Domains\" title=\"Domains.co.za - Register Domains\" target=\"_blank\" rel=\"noopener\">domain name<\/a> and <a href=\"https:\/\/www.domains.co.za\/web-hosting-south-africa\" alt=\"Link to Domains.co.za - Web Hosting\" title=\"Domains.co.za - Web Hosting\" target=\"_blank\" rel=\"noopener\">website hosting company <\/a>that specialises in providing small to medium enterprises with the tools to get online quickly, affordably and securely.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s National Cyber Security Awareness Month but in truth, recognition of this growing hazard should take precedence every day. South Africa experiences the third highest number of cybercrime attacks in the world, suffering 577 malware attacks every hour. Companies need to intensify their defence strategies. Unfortunately, with most of the attacks focussed on employees, a company\u2019s mitigation protocols are only as strong as their \u2018weakest\u2019 link. Here are our top 10 cyber security tips to protect your business and your remote workforce from the digital age\u2019s biggest threat! Cyber Security Tips for Businesses1. Implement a cyber security strategy for in-house and remote-working employees2. Train employees regularly &#038; <a alt='10 Cyber Security Tips for Businesses &amp; WFH Employees' title='10 Cyber Security Tips for Businesses &amp; WFH Employees' href='https:\/\/www.domains.co.za\/blog\/10-cyber-security-tips\/' class='moreElipsis'>[&#8230;]<\/a><\/p>\n","protected":false},"author":5,"featured_media":1263,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[1009],"tags":[1453,1450,1449,1446,1447,1451,1448,1452],"class_list":["post-1104","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-domain-tips","tag-create-a-company-cyber-defense-strategy","tag-cyber-security-strategy","tag-cyber-security-tips","tag-cyber-security-tips-for-businesses","tag-cyber-security-training-for-work-from-home-staff","tag-ensure-staff-have-cyber-security-training","tag-implement-cyber-security-strategy","tag-keep-up-to-date-on-cyber-attacks"],"_links":{"self":[{"href":"https:\/\/www.domains.co.za\/blog\/wp-json\/wp\/v2\/posts\/1104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.domains.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.domains.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.domains.co.za\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.domains.co.za\/blog\/wp-json\/wp\/v2\/comments?post=1104"}],"version-history":[{"count":4,"href":"https:\/\/www.domains.co.za\/blog\/wp-json\/wp\/v2\/posts\/1104\/revisions"}],"predecessor-version":[{"id":3427,"href":"https:\/\/www.domains.co.za\/blog\/wp-json\/wp\/v2\/posts\/1104\/revisions\/3427"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.domains.co.za\/blog\/wp-json\/wp\/v2\/media\/1263"}],"wp:attachment":[{"href":"https:\/\/www.domains.co.za\/blog\/wp-json\/wp\/v2\/media?parent=1104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.domains.co.za\/blog\/wp-json\/wp\/v2\/categories?post=1104"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.domains.co.za\/blog\/wp-json\/wp\/v2\/tags?post=1104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}