{"id":4830,"date":"2018-08-15T10:00:36","date_gmt":"2018-08-15T09:00:36","guid":{"rendered":"https:\/\/www.sage.com\/en-gb\/blog\/?p=4830"},"modified":"2026-01-29T10:33:40","modified_gmt":"2026-01-29T10:33:40","slug":"cybersecurity-basics","status":"publish","type":"post","link":"https:\/\/www.sage.com\/en-gb\/blog\/cybersecurity-basics\/","title":{"rendered":"Cybersecurity basics: How to stay safe online"},"content":{"rendered":"<header class=\"entry-header has-dark-background-color entry-header--has-illustration entry-header--has-illustration--generic\">\n\t<div class=\"container\">\n\t\t<div class=\"entry-header__row row align-center\">\n\t\t\t<div class=\"col col-lg-7 col-xlg-6 entry-header__content\">\n\t\t\t\t\t\t\t<div class=\"component component-single-header\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"entry-header__misc text--subtitle text--uppercase text--small\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.sage.com\/en-gb\/blog\/category\/technology-innovation\/\" class=\"entry-header__link\">Technology &amp; Innovation<\/a>\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"entry-title-wrapper\">\n\t\t\t\t\t<h1 class=\"entry-title\">\n\t\t\t\t\t\tCybersecurity basics: How to stay safe online\t\t\t\t\t<\/h1>\n\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<p class=\"entry-header__description\">\n\t\t\t\t\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n\t\t<div class=\"single-post-details container\">\n\t\t<div class=\"col\">\n\t\t\t<span class=\"posted-on \"><time class=\"entry-date published\" datetime=\"2018-08-15T10:00:36+01:00\">15 August, 2018<\/time><\/span><span class=\"reading-time\"> min read<\/span>\n\t\t<button\n\t\t\ttype=\"button\"\n\t\t\tclass=\"social-share-button button button--icon button--secondary js-social-share-button\"\n\t\t\tdata-share-title=\"Cybersecurity basics: How to stay safe online\"\n\t\t\tdata-share-url=\"https:\/\/www.sage.com\/en-gb\/blog\/cybersecurity-basics\/\"\n\t\t\tdata-share-text=\"Please read this interesting article\"\n\t\t>\n\t\t\t<span class=\"social-share-button__share-label\">Share<\/span>\n\t\t\t<span class=\"social-share-button__copy-label\" hidden>Copy Link<\/span>\n\t\t\t<span class=\"social-share-button__copy-tooltip\" aria-hidden=\"true\" hidden>Copied<\/span>\n\t\t<\/button>\n\n\t\t\t\t<\/div>\n\t<\/div>\n\t<\/header>\n\n\n\n<div class=\"wp-block-post-author has-dark-background-color alignfull\">\n\t<div class=\"container\">\n\t\t<div class=\"col\">\n\t\t\t\t\t\t\t<div class=\"co-authors\">\n\t\t\t\t\t\n\t\t<div class=\"entry-author-wrapper\">\n\t\t\t<a class=\"entry-author\" href=\"https:\/\/www.sage.com\/en-gb\/blog\/author\/staceymcintosh\/\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"40\" height=\"40\" src=\"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2018\/11\/Stacey-McIntosh-350-1.jpg\" class=\"entry-author__image\" alt=\"\" \/>\t\t\t\t<span class=\"entry-author__name\">Stacey McIntosh<\/span>\n\t\t\t<\/a>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n<p>As our world becomes more digital, companies are increasingly becoming more vulnerable to cyber criminals. Cyber-attacks can be defined as unauthorised attempts to access, corrupt or delete companies\u2019 sensitive data. In 2017, <u><a href=\"https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/609186\/Cyber_Security_Breaches_Survey_2017_main_report_PUBLIC.pdf\">46% of all UK businesses<\/a><\/u> reported at least one cybersecurity breach or attack and this rate rose to 66% for medium businesses and 68% for large businesses.<\/p>\n\n\n\n<p>To protect against cyber-attacks, it\u2019s important to understand best practices for keeping your company safe online.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-common-cybersecurity-questions\"><strong>Common cybersecurity questions<\/strong><\/h2>\n\n\n\n<p>Most businesses are still learning about cybersecurity basics. We\u2019ll help improve your cybersecurity knowledge by answering some of the most common questions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-are-the-biggest-cybersecurity-threats-for-businesses\"><strong>What are the biggest cybersecurity threats for businesses?<\/strong><\/h3>\n\n\n\n<p>Fraudulent emails are by far the biggest cybersecurity threat for businesses. In fact, <u><a href=\"https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/609186\/Cyber_Security_Breaches_Survey_2017_main_report_PUBLIC.pdf\">72% of all breaches<\/a><\/u> or cyber-attacks resulted from staff members receiving such emails.<\/p>\n\n\n\n<p>Businesses should also be aware of cyber threats such as viruses, spyware or malware, people impersonating the business or its employees in online communications, and ransomware.<\/p>\n\n\n\n<p>Thankfully, the most disruptive types of cyber-attacks can be avoided by properly training staff. Employees should know how to avoid phishing scams, best practices for password security, how to respond to fraudulent emails and other cybersecurity basics.&nbsp;Learn more about the types of cyber-attacks in our article <a href=\"https:\/\/www.sage.com\/en-gb\/blog\/what-is-cybersecurity\/\">What is cybersecurity?&nbsp;<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-links-are-safe-to-open\"><strong>What links are safe to open?<\/strong><\/h3>\n\n\n\n<p>It\u2019s important to always question a link\u2019s trustworthiness, even if the link has been sent by someone you know. Clicking on a bad link could result in your computer becoming infected by a virus, spyware or malware.<\/p>\n\n\n\n<p>When assessing a link, there are a few warning signs. For example, shortened links are often used by malware distributors or phishers (those that operate phishing scams) to hide the link\u2019s true destination. In addition, links including a bunch of strange characters, such as\u201c%\u201d, or from unsolicited emails are also best avoided.<\/p>\n\n\n\n<p>You can scan links to make sure they\u2019re safe to open using free online tools such as&nbsp;<u><a href=\"https:\/\/safeweb.norton.com\/\">Norton Safeweb<\/a><\/u>, <u><a href=\"http:\/\/www.urlvoid.com\/\">URLVoid<\/a><\/u>, or <u><a href=\"https:\/\/scanurl.net\/\">ScanURL<\/a><\/u>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-can-you-really-get-a-virus-just-from-opening-an-email\"><strong>Can you really get a virus just from opening an email?<\/strong><\/h3>\n\n\n\n<p>While opening an email can sometimes infect your computer, email attachments or links pose a much bigger threat. Email attachments and links can contain viruses, trojan horses, or worms that are activated when you click on them.<\/p>\n\n\n\n<p>Never download an attachment from an unknown sender. If you receive an email with an attachment or link from a known email address but weren\u2019t expecting anything, it\u2019s best to contact them and confirm the validity of the email. Hackers can easily gain access to email accounts and then send infected emails to the account users\u2019 contact list.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-is-it-safe-to-use-public-wifi\"><strong>Is it safe to use public wifi?<\/strong><\/h3>\n\n\n\n<p>It\u2019s not unusual for employees to work remotely and sometimes this includes working in coffee shops, on trains or other places with public wifi. Public wifi should not be trusted for sending, receiving, or working on sensitive corporate information as man-in-the-middle cyber-attacks are extremely common on unsecure networks.<\/p>\n\n\n\n<p>A man-in-the-middle cyber-attack is when an unauthorised individual views or accesses your private information as it travels from your computer to a website. Man-in-the-middle attacks are akin to online eavesdropping. It\u2019s recommended that remote employees use a VPN (virtual private network) or 4G for a safer connection when working in public spaces.<\/p>\n\n\n\n<figure class=\"wp-block-image alignnone size-full wp-image-4346\"><img loading=\"lazy\" decoding=\"async\" width=\"999\" height=\"666\" src=\"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2018\/05\/Sage_Cantelowes1251_All-Uses.jpg\" alt=\"Make sure you submit your self-assessment tax return by the 31 January deadline\" class=\"wp-image-4346\" srcset=\"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2018\/05\/Sage_Cantelowes1251_All-Uses.jpg 999w, https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2018\/05\/Sage_Cantelowes1251_All-Uses-768x512.jpg 768w\" sizes=\"auto, (max-width: 999px) 100vw, 999px\" \/><figcaption class=\"wp-element-caption\">Use antivirus software to stay safe when you&#8217;re online<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-stay-safe-online\"><strong>How to stay safe online<\/strong><\/h2>\n\n\n\n<p>Staying safe online doesn\u2019t need to be complicated or expensive. A few easy to implement security measures might prevent your company falling prey to cyber criminals and allow you to use the internet without problems. Here\u2019s the basic safety steps that every company should incorporate into their cybersecurity policies.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-to-stay-safe-when-using-the-cloud\"><strong>How to stay safe when using the cloud<\/strong><\/h3>\n\n\n\n<p><u><a href=\"https:\/\/www.sage.com\/en-gb\/accounting-software\/\">Cloud technology<\/a><\/u> allows remote employees to share, send and access real-time data from any location at any time. It also allows companies to automate administrative tasks, such as <a href=\"https:\/\/www.sage.com\/en-gb\/sage-business-cloud\/payroll\/\">payroll<\/a> or <a href=\"https:\/\/www.sage.com\/en-gb\/accounting-software\/invoicing\/\">invoices<\/a>, saving time and money. Like any online platform, it\u2019s important to maintain a sense of cybersecurity awareness when using the cloud.<\/p>\n\n\n\n<p>With proper vigilance and training, most cloud-based security threats can be easily avoided. According to a recent <u><a href=\"https:\/\/www.sage.com\/en-gb\/blog\/guide-to-staying-safe-in-the-cloud\/\">report<\/a><\/u>, 70% of data breaches on the cloud arose from employees accessing data without authorisation, 65% from employees using one password for multiple platforms, and 33% from employees sharing passwords with co-workers.<\/p>\n\n\n\n<p>To prevent against such threats, companies should have policies for employee access, encrypting data, and limiting the use of employees\u2019 personal devices such as mobiles or desktops.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-use-a-strong-password\"><strong>Use a strong password<\/strong><\/h3>\n\n\n\n<p>While most of us know the risks of poor passwords, few of us actually use strong passwords. According to best practices, passwords should be changed frequently and never used for more than one account.<\/p>\n\n\n\n<p><u><a href=\"https:\/\/support.google.com\/accounts\/answer\/32040?hl=en\">Google<\/a><\/u> explains that a strong password should include a mixture of letters, numbers and symbols. Best practices include replacing letters with numbers or symbols. For instance, Gettowork becomes G8t2w0rk, or taking the first letter of a longer sentence such as \u201cThe Duke of York had 10 Thousand Men\u201d becomes TDoYh10TM.<\/p>\n\n\n\n<p>These formats not only improve password security but also make passwords easier to remember. You can set password requirements on company devices and software to ensure that employees only use strong passwords.<\/p>\n\n\n\n<p>In addition to standard passwords, you can also protect business accounts with two-factor authentication (also known as 2FA). This provides a greater level of security as it involves sending a code to a trusted device like a mobile phone. This code must be entered to access the system or account, which makes it almost impossible for accounts to be hacked.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-to-choose-an-antivirus-software\"><strong>How to choose an antivirus software<\/strong><\/h3>\n\n\n\n<p>All devices should be protected by antivirus software. Antivirus software protect against scams, malware, spyware and ransomware. Some programs even backup important documents to make the recovery process easier.<\/p>\n\n\n\n<p>To select the right antivirus software, you should consider the size of your network or number of devices, the features provided in different packages, and any special requirements your business might have.<\/p>\n\n\n\n<p>Companies with more than 10 devices may want to invest in a business security solution as this will help protect the entire network. It\u2019s always recommended to pay for antivirus software instead of downloading a free version from the internet.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-avoid-pop-ups\"><strong>Avoid pop ups<\/strong><\/h3>\n\n\n\n<p>At best, pop ups are annoying but at worst they can be dangerous. Pop ups can trick unsuspecting users into clicking on unsafe links or downloading files containing viruses. Some pop ups, known as scareware, can even claim to have found a virus on your computer and ask for a payment to remove it.<\/p>\n\n\n\n<p>However, accepting this service can actually install more malware on to your computer. Always close pop ups using keyboard controls to avoid accidentally clicking on an unsafe link or setting your internet browser to block pop ups altogether.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-backup-and-encrypt-data\"><strong>Backup and encrypt data<\/strong><\/h3>\n\n\n\n<p>You should regularly backup all corporate data. That way, if your computer becomes infected, blocked, or corrupted by a virus or malware, you can still access important business information. Data should be stored somewhere safe and secure such as on blockchain cloud solutions or offline.<\/p>\n\n\n\n<p>Under the new <a href=\"https:\/\/www.sage.com\/en-gb\/blog\/what-is-the-gdpr\/\">GDPR regulations<\/a>, any company that collects or processes data on EU citizens must legally protect the data of their customers. Data must be encrypted using either privacy by design or by default measures, which renders the information unreadable to anyone without the proper decryption codes. While GDPR regulations only apply for customer data, encryption is still an effective measure for protecting all types of sensitive information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-to-do-if-you-suspect-a-data-breach-or-cyber-attack\"><strong>What to do if you suspect a data breach or cyber-attack?<\/strong><\/h2>\n\n\n\n<p>If you suspect a data breach or cyber-attack, it\u2019s essential to act promptly. Data breaches can be time sensitive so not responding immediately may have greater repercussions for your company. At first sign of a cyber-attack, contact your IT support. They\u2019ll be able to assess the situation, identify the cause, and implement a plan to correct or contain the situation.<\/p>\n\n\n\n<p>If the breach involved a data leakage of EU customer\u2019s personal information, you\u2019ll need to comply with <u><a href=\"https:\/\/ico.org.uk\/for-organisations\/guide-to-the-general-data-protection-regulation-gdpr\/personal-data-breaches\/\">GDPR regulations <\/a><\/u>for reporting the breach. Certain breaches will need to be reported to the ICO within 72 hours and depending on the severity, customers may also need to be informed.<\/p>\n\n\n\n<p>If you assess the breach as not needing to be reported, you still must document the circumstances and provide valid evidence to support your decision.<\/p>\n\n\n\n<p>Once the breach has been addressed and reported (if necessary), you\u2019ll need to closely examine your business\u2019 cybersecurity plans. In most cases, you\u2019ll need to enhance your online security and better train staff to ensure you\u2019re protected against future cyber-attacks.<\/p>\n\n\n<div class=\"single-cta\">\n\t<div class=\"single-cta__positioner\">\n\t\t<div class=\"single-cta__wrapper has-dark-background-color\">\n\t\t\t<div class=\"single-cta__content\">\n\t\t\t\t\t\t\t\t<h2 class=\"single-cta__title h3\">Subscribe to the Sage Advice newsletter<\/h2>\n\n\t\t\t\t\t\t\t\t\t<div class=\"single-cta__description\">\n\t\t\t\t\t\t<p>Join more than 500,000 UK readers and get the best business admin strategies and tactics, as well as actionable advice to help your company thrive, in your inbox every month.<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a\n\t\t\t\t\t\thref=\"#gate-b1a63862-3fa0-4a5e-bb67-c76b88bbc6b8\"\n\t\t\t\t\t\tclass=\"single-cta__button button button--primary\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t>Subscribe now<\/a>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<img decoding=\"async\" width=\"1440\" height=\"810\" src=\"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2022\/04\/GettyImages-1073797282-1-1440x810.jpg\" class=\"single-cta__image\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2022\/04\/GettyImages-1073797282-1-1440x810.jpg 1440w\" sizes=\"auto, (min-width: 48em) 33vw, 100vw\" \/>\t\t\t<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>As our world becomes more digital, companies are increasingly becoming more vulnerable to cyber criminals. Cyber-attacks can be defined as unauthorised attempts to access, corrupt or delete companies\u2019 sensitive data. In 2017, 46% of all UK businesses reported at least one cybersecurity breach or attack and this rate rose to 66% for medium businesses and [&hellip;]<\/p>\n","protected":false},"author":346,"featured_media":4348,"menu_order":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_sage_video":false,"post_featured_image_hide":false,"sage_hide_published_date":false,"sage_hide_read_time":false,"sage_hide_share_buttons":false,"footnotes":""},"categories":[11],"tags":[52,125],"business_type":[4,3],"lilypad":[],"context":[],"industry":[],"persona":[70,71,73,74],"imagine_tag":[96,109],"coauthors":[353],"class_list":["post-4830","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology-innovation","tag-security-fraud","tag-workplace-technology","business_type-small-business","business_type-medium-sized-business"],"sage_meta":{"region":"en-gb","author_name":"Stacey McIntosh","featured_image":"https:\/\/www.sage.com\/en-gb\/blog\/wp-content\/uploads\/sites\/10\/2018\/05\/Sage_Cantelowes1444_All-Uses.jpg","imagine_tags":{"96":"Medium businesses","109":"Small business"}},"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Sage Advice UK","distributor_original_site_url":"https:\/\/www.sage.com\/en-gb\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/posts\/4830","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/users\/346"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/comments?post=4830"}],"version-history":[{"count":0,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/posts\/4830\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/media\/4348"}],"wp:attachment":[{"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/media?parent=4830"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/categories?post=4830"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/tags?post=4830"},{"taxonomy":"business_type","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/business_type?post=4830"},{"taxonomy":"lilypad","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/lilypad?post=4830"},{"taxonomy":"context","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/context?post=4830"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/industry?post=4830"},{"taxonomy":"persona","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/persona?post=4830"},{"taxonomy":"imagine_tag","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/imagine_tag?post=4830"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.sage.com\/en-gb\/blog\/api\/wp\/v2\/coauthors?post=4830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}