Tier 1 are delighted to announce that we have successfully renewed our Cyber Essentials certification for another year. Cyber Essentials is a government-backed industry-supported scheme designed to help organisations protect themselves against common online threats.
The certification covers all aspects of cybersecurity not limited to servers, workspaces, laptops, firewall hardware, network switches, anti-virus and software applications. The thorough certification is essential for ITADs (IT Asset Disposition organisations) and helps provide our customers with peace of mind that they are working with a secure provider.
This year, the Cyber Essentials certificate was updated to cover homeworking. While we have been working from home for this past year, cybersecurity awareness has become even more important. It’s vital that we remain diligent to potential threats whilst working remotely, especially when it comes to the precautions for protecting ourselves, our data and that of our customers.
There are many threats to consider so it’s important to seek professional advice but here are some quick tips to help you keep your data safe.
Secure your home router
Change your wifi router password and admin password from the default to something more secure. This will help stop people from accessing your personal router, monitoring your traffic and intercepting your data.
Use 2 step authentication
2 step authentication can be a bit of a pain, but it’s a very secure technique. If someone tries to log in using your password, you’ll either be notified of a login attempt or need to verify the log-in attempt usually using a time-based code.
Update your software
Out of date software offers hackers the chance to take advantage of your systems. When updates are released they usually fix any issues that could lead to a security breach. By using out of date software you leave those potential issues open for exploitation.
Turn off features, add ons and software you don’t need
Similar to keeping your software updated, having unused software on the system gives an opportunity for nefarious people to gain access to your computer. Often the software can be exploited and breached. You need to ensure that access is revoked if you’re no longer using it.