Business IQ

Whistle a happy tune to improve cyber-security

Simon Sharwood
Technology Journalist

Simon Sharwood has written about technology since the early 1980s and still isn't bored

Simon Sharwood
Technology Journalist

Simon Sharwood has written about technology since the early 1980s and still isn't bored

Take a few simple and practical precautions to improve the cyber-security of your business.

Cybercrime is a well-established global threat to millions of businesses worldwide. It's wise to be wary, but there's no need for panic because a couple of easy ‑ and inexpensive ‑ actions can help make your business a far harder target.

a set of keys sitting on a computer keyboard

Start with passwords. Analyses of password databases stolen by criminals often reveal that the most used passwords are laughably easy to guess. You'd be surprised how many people use “password” or “123456”. Criminals have automated attacks that look for the most common passwords, so just using tougher passwords makes their lives much harder. Creating a memorable but tough password isn't that hard. I finished school in 1990, the year in which Australia's best-selling song was Sinead O'Connor's Nothing Compares 2 U. That fact can make a nicely secure password.

Check out Telstra’s Cyber Security Report 2016 here. 
Find out more

Start with the first letters of the artist's name – soc – and then use the first letter of each word in the song title – nc2u. Next, add the year the song topped the charts and mix in some capital letters to create the password “SOCnc2u1990”. That kind of password looks like random gibberish, but is quite easy to remember.

There are lots of ways to play this game: Daniel Day Lewis won Best Actor for the 1989 film My Left Foot. Which gives you “DDLBA1989MLF” as a password.

This kind of password is unlikely to be guessed by criminals*, who prefer to make guesses about your passwords based on easy to find information such as your pet’s name. Don't think those names are obscure: chances are you mentioned “Cuddles” on Facebook without thinking twice that a criminal would consider it as a way to attack the internet banking account you secured with the password “Cuddl35”. But that's just the kind of thing criminals look for, so keep Cuddles out of your passwords!

If you like the idea of complex passwords, but worry something more cryptic like the musical concoction we've described above is too hard to remember, consider software called “password managers”. Password managers store all your passwords for every site you use, and all that is required is one very complex password to access your ‘vault.’ Password Managers don't mean you should revert to “123456”, but they do make it easier to manage a different secure and complex password for each website or service you use. Some password managers, such as the excellent LastPass, are even free (for the basic version).

That’s not to say a Password Manager is a silver bullet capable of taking out all security vampires. Indeed, it introduces a new risk because every new piece of software is another tool you need to keep secure with the latest security patches. Operating systems such as Windows, Android and iOS, as well as the apps you run on them, nag you to update them when they need a security patch. But your printer and the modem you use to connect to the internet probably don't. Nor will software-like plug-ins for your browser or content-management system. A huge 73 per cent of all WordPress installations had known vulnerabilities, according to a WP White Security study.

With different plug-ins created by different developers, the possibility of security weakness increases.  Most people never think to list all the things they use in their business: just creating a list of them all and checking to make sure they're updated puts you a step ahead of any hidden vulnerabilities a cybercriminal might exploit. The same goes for updating and backing up your CMS and other databases.

Maintain a list of all the apps, services, platforms, plug-ins and more in your world that need to be checked for updates. This could help you stay on top of possible problems before they get serious. Secure that list with a good password and you'll have taken two precautions to help reduce your exposure to basic criminal hacking.

* Please don't use these examples as your password – we've kind of given the bad guys a leg up by explaining these methods!

Learn how to secure your cloud in 5 simple steps.
Find out more

Related News

A woman using her laptop and phone in a shop.
Tech Solutions
Tech Solutions
Get to the nbn™ network starting line in great shape

Even if it may still be some time before the nbn network is available in your neighbourhood, planning now can mean a hassle-free switch over when it happens. When the nbn™ netw...

Business woman giving speech in front of peers holding a microphone.
Success Stories
Success Stories
The tips, tricks and non-negotiables of winning speeches

Business leaders give great speeches, and the 2017 Telstra Business Women's Awards finalists are no exception thanks to the tips, tricks and non-negotiables they are taught dur...

Business woman giving speech in front of peers holding iPad.
Success Stories
Success Stories
Six steps to spectacular speeches

Public speaking is commonly quoted as one of the world’s most common fears, but it's a skill business leaders must master to be influential at networking events, workshops and ...

Elise Apolloni with her 2017 Telstra  Australian Capital Territory Business Woman of the Year Award.
Success Stories
Success Stories
Wanniassa pharmacist is named 2017 Telstra ACT Business Woman of the Year

Elise Apolloni from Capital Chemist Wanniassa cleaned up at the 2017 Telstra Australian Capital Territory Business Women’s Awards, winning three Awards, including 2017 Telstra ...