How to Prevent a Security Breach in the Workplace

Home > Blog > How to Prevent a Security Breach in the Workplace
21 February, 2018

Nowadays, the threat of a cyber attack is never far away. It is therefore important to know how to prevent a security breach in the workplace.

One misconception that people seem to have is the idea that large companies are usually the target of cyber attacks. That is simply not the case. In fact, small and medium-sized businesses are just as likely to become a target of cyber criminals. This therefore means that all businesses should have extensive security measures in place, and know what to do in the event of a breach.

How to Prevent a Security Breach

Ten Ten Systems are only too aware of the impact that a security breach can have on your businesses. Because of this, we have complied 7 ways that you can protect your business online, as well as a handy infographic.

1. Back It Up

Backing up data is one of the best defense methods that businesses have against hackers. Hackers can use ransomware to prevent businesses from accessing their data. They do this by encrypting it, and then asking for payment to decrypt it. However, there is no guarantee that you will be able to retrieve your data, even if you make the payment. By regularly backing up data businesses, you can restore the last back-up and get your business up and running again quickly.

2. Security Updates, Patches, and Anti-Virus

Always make sure that your operating software is up to date as part of your overall network security. Alongside this, make sure you have a robust firewall and anti-virus, spyware and malware protection. Software that is out of date puts your business at a greater risk of cyber attack. Use products like Office 365 which have regular security updates.

3. Encryption

There may be occasions where a laptop, mobile or pen drive is lost or stolen. No business wants to find that their data has been compromised, and so encryption is a great way to safeguard data. Data encryption not only protects against cyber and physical data attacks, but also the physical loss of data.

4. Email Vigilance

One of the most common types of security breach is staff opening hoax emails. Emails have many traits that can be exploited by fraudsters. By making your staff aware of them, you can lower the risk of a breach. Typical warning signs of a fraud email include:

  • Common greetings like ‘Dear Customer’ instead of a real name
  • Phrases that create a sense of urgency, like ‘your account may be closed if you do not act immediately’
  • Requests for personal data such as usernames, passwords, or bank account details
  • Website URL that has deceptive characters, such as ‘’ instead of ‘’
  • Sender email address that does not match the organisation’s website
  • Glaring spelling and grammatical errors

Encourage staff to speak to your IT support team if they are unsure if an email is legitimate. Advise them to research the company name via an online search to make sure that the company is real.

Make staff aware that they must not open, reply to, or click on an email or attachment if they are unsure of the source. If a staff member has accidentally done so, then instruct them to speak to your IT support team and not to give out any further details.

5. Multi-Factor Authentication

Protect your online customer by using two-factor or multi-way authentications. The more information that is required by a customer to access an online account, the harder that account is to hack.

Two factor or multi-way authentications usually require the confirmation of a username and password, plus additional information. Popular additional authentications include confirming an authorisation code sent to the account holder via email or text, or answering a question chosen by the account holder. Other methods include fingerprint and facial recognition.

6. Set Permissions and Limit Access

Consider what permissions each of your employees need for their role and give them the relevant access. This helps protect your organisation against unauthorised access to company devices, accounts, and data, and ultimately prevent a security breach.

7. Secure Your WiFi

The use of wifi is an integral part of business life. Employees use it to access and share files, and for procurement and sales, the uses are diverse. However, would you want customers or guests to access your sensitive business data? Hopefully not. A simple solution is to therefore set up a separate wifi for customers and guests to use, leaving your private network for staff use only.

Let Us Help

We offer a wide range of network security solutions, from data back up and disaster recovery to encryption. If you need help or advice to on how to protect your business, then please contact us or pop into our Chester office.

For more information about our service

Get in touch