5 common cybersecurity mistakes to avoid

Sometimes it’s the little things that make the biggest difference. These might seem like obvious pitfalls to swerve, but it’s scary how frequently we hear about some disaster following a really basic cybersecurity error.

1. Not regularly reviewing user access and permissions

It can feel like a never-ending job but keeping track of new joiners, leavers, job changes, and the impact this has on user management really matters. Just think of the damage a disgruntled ex-employee could do if, after heading off to a competitor, they can still access the CRM and print off a handy copy of your client list.

So start by breaking down the task into 2 steps. First, you look at who has access to what – ‘does this person really need to use this system to do their job?’ – and if the answer is yes, take a look at just how much access they have: do they need view-only or full admin rights?

Most applications these days come with the ability to support different levels of user access, so start with the priority systems and work your way down the list from there.

2. Not taking GDPR seriously

Everyone’s hitching their horse to the GDPR bandwagon and promising to get you ‘GDPR ready’ in some way or another. The danger of this of course is that it all begins to feel somewhat overwhelming, the magnitude of required change too great and so paralysis sets in. But whilst we can sympathize with a lack of GDPR enthusiasm, now it’s in place, all businesses must comply.

3. Not taking advantage of 2FA where you can

Two-factor authentication (2FA) builds on the advice in point one. It helps to layer security to make infiltration just that little bit harder for cybercriminals and make sure someone really is who they say they are.

2FA requires not only a password and username for someone to login but for verification via another means to prove it’s definitely them, this is typically done via a code or prompt on a mobile phone. Just a word of warning, advice is not to use SMS verification as it can come with its own problems.

If you’re still not convinced about robust passwords and 2FA then we have one word for you: Equifax.

4. Not doing regular pen testing

Penetration testing (pen testing for short) is where you simulate an attack on your computer network so you can effectively evaluate just how secure it is. Pen testing doesn’t have to be all about the weaknesses, such as possible entry points for unauthorized parties, but it also highlights your network’s strengths. Doing this regularly keeps you up-to-date with what you need to be keeping an eye on and what needs to be fixed as soon as possible.

5. Not deploying DMARC

DMARC is the email authentication protocol that not only gives you complete visibility into how your domains are being used (and abused!) to send emails, but most importantly helps you to lock it down so that only authorized senders can send emails using your domain. It’s an open, standard protocol, widely endorsed by email providers and government agencies alike, so there’s really no excuse for not protecting yourself against email phishing attacks.

Take the first step towards safer email today

So that’s it, our top 5 common cybersecurity mistakes to definitely avoid. If you’re wondering where to start on your journey to safer email, then why not take the first step and see how your current email security setup looks?

Use our free investigate tool to quickly and easily check the SPF, DKIM, and DMARC setup of your domain, you won’t regret it!

check email setup

PUBLISHED BY

Clare Holmes

18 Jan. 2018

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
Email

The best tools to protect yourself from SubdoMailing

Francesca Rünger-Field

In late February 2024, ‘SubdoMailing’ became a trending search term overnight. Research by Guardio Labs uncovered a massive-scale phishing campaign that had been going on since at least 2022. At the time of reporting, the campaign had sent 5 million emails a day from more than 8,000 compromised domains and 13,000 subdomains with several…

Read more
Product Release

Red Sift’s Spring 2024 Quarterly Product Release

Francesca Rünger-Field

This early into 2024, the cybersecurity space is already buzzing with activity. Emerging standards, such as Google and Yahoo’s bulk sender requirements, mark a new era of compliance for businesses reliant on email communication. At the same time, the prevalence of sophisticated cyber threats, such as the SubdoMailing campaign, emphasizes the continual hurdles posed…

Read more
Email

Navigating the “SubdoMailing” attack: How Red Sift proactively identified and remediated a…

Rebecca Warren

In the world of cybersecurity, a new threat has emerged. Known as “SubdoMailing,” this new attack cunningly bypasses some of the safeguards that DMARC sets up to protect email integrity.  In this blog we will focus on how the strategic investments we have made at Red Sift allowed us to discover and protect against…

Read more
Email

Where are we now? One month of Google and Yahoo’s new requirements…

Rebecca Warren

As of March 1, 2024, we are one month into Google and Yahoo’s new requirements for bulk senders. Before these requirements went live, we used Red Sift’s BIMI Radar to understand global readiness, and the picture wasn’t pretty.  At the end of January 2024, one-third of global enterprises were bound to fail the new…

Read more