Saturday, May 28, 2022
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • How-Tos
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • Video
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • How-Tos
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • Video
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Estonia publishes security recommendations for businesses

Estonia publishes security recommendations for businesses

The Estonian Information System Authority (RIA) has published four recommendations for managers of businesses for the prevention of cyberattacks.

Seda Nur Cinar by Seda Nur Cinar
October 26, 2020
in Cybersecurity
2 min read
0 0
0
Estonian Information System Authority publishes security recommendations for businesses
0
SHARES
11
VIEWS
Share on FacebookShare on TwitterShare on EmailFollow on Google News

While the expansion of remote working is continuing due to the COVID-19 pandemic, to keep the companies safe is getting more difficult because of diversified cyberattacks. Estonia is one of the countries that faces such attacks. Therefore, the Estonian Information System Authority (RIA) has published four recommendations for managers of businesses for the prevention of cyberattacks.

Table of Contents

  • To pay attention to cyber hygiene
  • To know what hardware and software your company is using
  • To know who of employees have access to data
  • To educate your team on the most common cyber-attacks

To pay attention to cyber hygiene

One of the four recommendations is to pay attention to your own and your colleagues’ cyber hygiene. The whole company and its employees may suffer as a result of the negligent attitude of a single person so companies must pay attention to the personal cyber hygiene of their employees to prevent financial or reputation damage as a result of a cyber-attack.  “The cybersecurity of a business depends on each individual employee. On whether they carefully check the sender’s name and address in each e-mail, apply multi-step authentication in e-mail accounts, take care of updating their passwords and the software on their computers,” Joosep Sander Juhanson, information security expert at RIA said.

To know what hardware and software your company is using

The day-to-day work of a business is mostly done using computers. Businesses use a wide variety of software in their work, starting with customer management software and sales and business software, and ending with accounting software. Therefore, users frequently get notifications that updates are available. Unfortunately, the update often is not made. To solve this problem, businesses should appoint people whose duty is to observe that necessary software updates are performed. Also, businesses should have a precise overview of the programs and computers that are used by their team in their work.

To know who of employees have access to data

Cybercriminals know that in the information society, data is more valuable for a business than ever before. Because of this, they are constantly seeking opportunities to find security gaps in the information systems of businesses. It must be clearly known in a company that has access to various data. Having clear procedural rules in place helps prevent cyber-attacks and find a solution to the problem faster if an attack occurs.

To educate your team on the most common cyber-attacks

The main cyber incidents causing financial damage to Estonian companies are executive-mimicking fraud schemes, invoice scams and ransomware attacks. Pointing out that with an incompetent response a cyber-attack may halt the business of a whole enterprise. “Being able to recognize the most common cyber-attacks may save a business from incurring expenses amounting to the tens of thousands of euros due to cybercriminals” said Juhanson.

See more Cyber Security News


ShareTweetSendShare
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy
Previous Post

ngena to expand its operations in the Americas

Next Post

State-owned Telecom Egypt (TE) builds Egypt’s first international data center

Seda Nur Cinar

Seda Nur Cinar

Seda Nur Cinar is the news editor of the Cloud7 News. With more than 8 years of Linux and cloud experience, Seda is a Linux and opensource enthusiast, security researcher and a web application developer.

Related News

Proof-of-concept exploit code for VMware vulnerability released

Proof-of-concept exploit code for VMware vulnerability released

May 27, 2022 6:48 pm
Tor Browser on Tails 5.0 is not safe

Tor Browser on Tails 5.0 is not safe

May 27, 2022 12:32 pm
VMware ESXi servers are being targeted by a new ransomware

VMware ESXi servers are being targeted by a new ransomware

May 26, 2022 2:07 pm
StackPatch unveils new WAF packages

StackPath unveils new WAF packages

May 24, 2022 4:56 pm
Next Post
TE builds Egypt's first international data center

State-owned Telecom Egypt (TE) builds Egypt's first international data center

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Editor's Choice

Interview with Igor Seletskiy on AlmaLinux

7 best hosting control panels

How to update Linux Kernel without rebooting?

7 best Linux mail servers for 2022

7 best cPanel alternatives for 2022

7 best Linux web browsers for 2022

7 best CentOS alternatives

7 best Linux server distros for 2022

How to scan your server for Log4j (Log4Shell) vulnerability

Best web hosting service providers

AlmaLinux 8.6 Stable is ready to download

Ubuntu 22.04 LTS is available for download. What is new?

Kali Linux 2022.2 is ready for download

Advertisement

Recent News

  • [Event] Ops 101: Explore Ethical Hacking & Cybersecurity Careers
  • Proof-of-concept exploit code for VMware vulnerability released
  • WordPress.com unveils WordPress Starter plan
  • Wayland 1.21 Alpha is released
  • AlmaLinux 9 “Emerald Puma” is available for download

Our Latest Interview

Interview: Erez Barak, Vice President Observability of Sumo Logic
Interview

Interview: Erez Barak, Vice President Observability of Sumo Logic

by Atalay Kelestemur
November 25, 2021 3:23 am


Cloud7 News is a news source that publishes the latest news, industry news and exclusive interviews on web hosting, cloud computing, data center, cybersecurity and linux.

News Categories

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Blockchain

Our Free Modules

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2022, Cloud7 News. Latest Cloud Computing, Web Hosting, Data Center Industry and Tech News

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • How-Tos
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • Video
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2022, Cloud7 News. Latest Cloud Computing, Web Hosting, Data Center Industry and Tech News

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.