RoundWorks IT

Follow Us

A Guide To Cyber Security

By Luke Watts // 14th November 2019

In light of Cyber Security Awareness Month, what better time to brush up on security than now?

Like eating your 5-a-day, we all know that we should be keeping our Cyber Security in check, but for many, it often falls under that all too familiar ‘I’ll start on Monday’ ethos. However, as we rapidly approach the festive season, cyber threats such as phishing attacks are prevalent more than ever.

At RoundWorks, you could say we know a thing or two about Cyber Security.

So, join us as we walk you through some of the most common cyber threats to be wary of and how to stay properly protected!

What Are Cyber Threats?

What Are Cyber Threats? - A Guide By RoundWorks IT

With endless access to online channels, technology and other useful tools and resources, it’s only natural that we harvest these in everyday life. However, with great leaps forward, it has also opened doors to areas of vulnerability.

By definition, cyber threats are malicious actions that seek to either damage or steal data and generally disrupt general operations. Common threats include:

Computer Viruses

A computer virus is a type of malicious code or computer programme that is designed to interrupt the way your computer operates. It works by either inserting or attaching itself to a legitimate programme or document. Computer viruses have the potential to corrupt data beyond repair and damage the computers system and software. Viruses can spread through emails, text messages, downloadable files and even social media scam links.


Ransomware is a form of malicious software that is designed to block computer access while also threatening to publish users data until a ransom is paid in full. Ransomware can be spread through phishing emails, downloading content from an unreliable source or simply visiting an infected website.

Phishing Attacks

Phishing is a type of cyber attack that typically disguises its self as a trusted entity in order to steal sensitive information such as bank details. Phishing attacks are typically spread through email or text message and are often difficult to distinguish. Always directly check with the individual or organisation before unexpectedly disclosing sensitive information.

How To Stay Cyber Safe

How To Stay Cyber Safe - RoundWorks IT

Now that we have outlined some of the most common threats and how they could affect your daily operations let take a look at some ways you can keep both yourself and your business protected from unwanted breaches.

Practice Good Password Management

It may sound simple, but it’s often the shortest hurdles that can trip us up in the sprint towards success. If you are notorious for using the same password for every account or simply choosing easy-to-guess passwords, then you are quite simply playing with fire.

Eight characters are simply not enough in this day and age. Utilising tools which automatically generate strong and unique passwords is essential.

However, if you decide to manage passwords yourself, here are some basics that must be followed:

  • Opt for long passwords, ideally with at LEAST 20 unique characters
  • Use a mix of letters, numbers and symbols
  • Do not use the same password for various accounts
  • Do not share your password
  • Change your password every 3-6 months

Invest In 360 IT Security Systems

When it comes to IT Security, many individuals automatically just think about anti-virus. I mean how much more could there be to IT Security, right?

You may be surprised to know that IT Security expands much further than just a simple anti-virus software. Dependant on your businesses needs and requirements, you may need a little more security than you thought.

Here are some of the services you could expect from a fully comprehensive protection package:

  • Managed Security Firewalls-as-a-Service
  • Managed Email Filtering & Security
  • Managed Web Filtering
  • Managed Full Disc Encryption

Implement Robust Backup Processes

When things are ticking along nicely, it can be difficult to consider what eventualities lie ahead if the worst were to happen. But should disaster strike it is imperative to have the correct processes in place to help you get back on your feet quickly and with as little disruption as possible?

Take a look at our full Disaster Recovery Plan Guide for a full step-by-step guide.

Keep Your Software & Operating Systems In Shape

We’ve all postponed an update or two in the past. Whether it’s been on our mobile phones or computers, they always seem to crop up when you’re busy.

But, did you know that by delaying an update, you are actually putting your business in harm’s way?

Postponing essential security updates and bug fixes could, in fact, leave your network vulnerable to a whole host of cyber-attacks. Keeping your system in shape could be the difference between experiencing detrimental downtime or not, so ensure you’re always up-to-date.

Need A Hand With Cyber Security?

Stumbling through the do’s and don’ts of cyber security can be a stressful and time-consuming task.

If you’re concerned about your security hygiene, or simply want to have a natter about your businesses requirements, get in touch with the RoundWorks team today. An expert advisor will be sure to walk you through some cyber security basics.

Get in touch today or visit our Cyber Security service page where you can learn more about what we can do for you.