Skip navigation

Small business guide to cyber security | Step 2: Protecting your organisation from malware

Written by: Mettle editorial, Content writers, Mettle
3 min read

In the second of our series with the National Cyber Security Centre, we look at the apps and devices you and your business use.

Small business guide to cyber security 2

In the second of the NCSC’s small business guide series, we focus on how to protect your business from malware. With 5 top tips, this blog takes you through everything from antivirus software to the correct use of USBs and memory cards. 

For more guides and information you can head to www.ncsc.gov.uk 

Step 2 - Protecting your organisation from malware

Malicious software (also known as 'malware') is software or web content that can harm your organisation, such as the recent WannaCry outbreak. The most well-known form of malware is viruses, which are self-copying programs that infect legitimate software.

This section contains 5 free and easy-to-implement tips that can help prevent malware from damaging your organisation.

Tip 1: Install (and turn on) antivirus software

Antivirus software - which is often included for free within popular operating systems - should be used on all computers and laptops. For your office equipment, you can pretty much click 'enable', and you're instantly safer. Smartphones and tablets might require a different approach and if configured in accordance with the NCSC's EUD guidance, separate antivirus software might not be necessary.

Tip 2: Prevent staff from downloading dodgy apps 

You should only download apps for mobile phones and tablets from manufacturer-approved stores (like Google Play or Apple App Store). These apps are checked to provide a certain level of protection from malware that might cause harm. You should prevent staff from downloading third-party apps from unknown vendors/sources, as these will not have been checked.

Staff accounts should only have enough access required to perform their role, with extra permissions (i.e. for administrators) only given to those who need it.  When administrative accounts are created, they should only be used for that specific task, with standard user accounts used for general work.

NCSC 2

Tip 3: Keep all your IT equipment up to date (patching)

For all your IT equipment (so tablets, smartphones, laptops and PCs), make sure that the software and firmware are always kept up to date with the latest versions from software developers, hardware suppliers and vendors. Applying these updates (a process known as patching) is one of the most important things you can do to improve security - the IT version of eating your fruit and veg. Operating systems, programmes, phones and apps should all be set to 'automatically update' wherever this is an option.

At some point, these updates will no longer be available (as the product reaches the end of its supported life), at which point you should consider replacing it with a modern alternative. For more information on applying updates, refer to the NCSC's guidance on Vulnerability Management.

Tip 4: Control how USB drives (and memory cards) can be used

We all know how tempting it is to use USB drives or memory cards to transfer files between organisations and people. However, it only takes a single cavalier user to inadvertently plug in an infected stick (such as a USB drive containing malware) to devastate the whole organisation.

When drives and cards are openly shared, it becomes hard to track what they contain, where they've been, and who has used them. You can reduce the likelihood of infection by:

  • blocking access to physical ports for most users

  • using antivirus tools

  • only allowing approved drives and cards to be used within your organisation - and nowhere else

Make these directives part of your company policy to prevent your organisation from being exposed to unnecessary risks. You can also ask staff to transfer files using alternative means (such as by email or cloud storage), rather than via USB.

Tip 5: Switch on your firewall

Firewalls create a 'buffer zone' between your own network and external networks (such as the Internet). Most popular operating systems now include a firewall, so it may simply be a case of switching this on. For more detailed information on using firewalls, refer to the Network Security section of the NCSC's 10 Steps to Cyber Security.

Click here to move on to step 3 and learn how you can keep your smartphones (and tablets) safe.

Content writersMettle
linkedIn logo

At Mettle, our aim is to give everyone the financial confidence to work for themselves, and that’s no different with our content. We want to give small business owners, freelancers and sole traders the tips, tricks and industry updates they need to run their businesses. 

You might also like