โ€œWe needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.โ€

IT Operations Manager
Simon Darley
Trusted by industry leaders

Let's Talk

Call us on one of the numbers below, we cover the whole of the UK, so call the nearest office.

BriSTOL HQ & The South West

London & Surrounding Areas

Manchester & the North

โ€œWe needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.โ€

IT Operations Manager
Simon Darley
Trusted by industry leaders

Request a Call-back.

First we need a few details.

ENQUIRY - Contact Popup DEPRECIATED (#3)

Keep up to date with the experts

Get insights directly to your email inbox

MAIL LIST - Newsletter, Exit Intent Popup (#13)

Follow us on social

โ€œWe needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.โ€

IT Operations Manager
Simon Darley
Trusted by industry leaders

Request a Call

First we need a few details.

ENQUIRY - Popup w/ Captcha for light backgrounds (#21)

12 Tips for a Cyber Safe Christmas

Published: December 23, 2022
Updated: May 29, 2024
In a nutshell:
Here are our cloud and security experts 12 top-tips, to ensure that your business and workforce, stay one step ahead of the hackers this Christmas.

Want to avoid your business data being St.Nicked this Christmas?

As Christmas approaches, many of you will be winding down and preparing for the festivities โ€“ unfortunately, cyber criminals notoriously take advantage of the holiday season, coercing their way into our digital spaces and cashing in on the season of giving.

With this in mind, here are our cloud and security experts 12 top-tips, to ensure that your business and workforce, stay one step ahead of the hackers.

โ€œPhishing emails advertising the latest โ€˜Christmas Dealsโ€™ or spoofing well known parcel delivery service providers are very common tactics used by malicious actors.

Never trust an email and always check the wording of carefully, and then check it again! Also remember to check the sender, was it really sent from Amazonโ€ฆ? By putting a bit of thought into how we respond to our digital correspondence we can avoid providing digital criminals with the information and access they are trying so hard to gain.โ€

โ€œThe biggest threat our clients face is phishing and social engineering: always check the senderโ€™s address and any links included. Hovering over a link will show you where itโ€™s taking you; if in any doubt donโ€™t click it! The safer option is always to open a new browser and navigate to a specific website yourself without clicking any risky links.โ€

โ€œEveryone knows that strong passwords are annoying to remember, however the dangers associated with being compromised far outweigh the pain it takes to remember! For example, an 8-character password takes roughly 5 hours to crack when itโ€™s all in lowercase text. The key is to use a password which contains a minimum of 12 characters that include numbers, symbols, capital letters mixed with lower-case letters. To protect your employees that step further we also recommend MFA is enforced on all user accounts for that extra piece of mind!โ€

This tip comes from our Cyber Security Architect, Austen, which leads nicely on toโ€ฆ

4. Use a Password Manager

Generating, storing, managing and remembering multiple passwords can seem daunting, which is why our Director Tomโ€™s, top-tip is to ensure that your companywide password policy includes utilising a password manager:

โ€œUse a password management tool to ensure that each password for each service is different โ€“ their memory is better than yours! Password managers generate uniquely strong passwords that you donโ€™t need to remember.โ€

โ€œSadly passwords get stolen, leaked or disclosed to people who shouldnโ€™t have them, almost no matter what safeguards you might use. So having a strategy to stay ahead of anyone who would try to use your accounts is key to success. Enabling Multi-Factor Authentication (aka MFA/2FA) on EVERYTHING can improve your online security immeasurably.

MFA will challenge anyone who uses your password to provide a secondary authentication factor such as a code, phone call or push notification in a mobile app. Even when a malicious actor has your password, without your second factor they still canโ€™t breach your account in most cases.โ€

โ€œWhen out and about enjoying your company Christmas meals, never connect to public wifi! You never know who is listeningโ€ฆโ€

This top tip comes from Lex our Information Security Manager. As tempting as it is to connect to these public hotspots and share a picture of your mulled wine, you leave yourself at risk from man-in-the-middle attacks, unencrypted networks and malware distributionโ€ฆ

This top tip comes from our Technical Director Alex, and no, heโ€™s not talking about a Christmas Yule logโ€ฆ

โ€œEnsure you employ someone to look at the alerts from anti-virus software and monitoring agents โ€“ itโ€™s all well and good having managed devices, but without someone watching the logs you canโ€™t react in time!โ€

8. Backup, and then backup again!

โ€œRestoring and protecting your data go hand in hand. I would recommend running onsite and offsite backup simultaneously to protect against all eventualities, in addition to having a disaster recovery plan in place to ensure the fasted revival time. When a crucial system goes down, knowing what to do, who will do it and where the backup data is stored means your business will be up and running again in the fastest possible time.

โ€˜Over 28,000 people fell victim to fraud during last yearโ€™s Christmas shopping period. To successfully fight against malicious actors this year, it is critical that businesses foster a cyber-security culture through education and security best practices. Iโ€™d recommend starting awareness training during employee onboarding and follow an official cyber security training plan.โ€™

Ryan again suggests:

โ€œThis model essentially acts under the impression that all users and devices trying to access the network are threats. Make sure your network users use robust authentication measure, make sure you segment your network, and definitely adopt a least privileged access model.โ€

โ€œSIEM tools allow security analysts to investigate security alerts in real-time, which reduces the average time to identify and respond to breaches. IBM say the average time to respond to a breach in 2020 was 207 days โ€“ which is why a SIEM tool should be at the top of everyoneโ€™s Christmas list this year!โ€

โ€œWork proactively, not reactively! Donโ€™t wait until malicious actors find a network vulnerability to exploit and actively test your infrastructure and applications with a Penetration Test to uncover any weaknesses ahead of time.โ€