Computer Support, Design, Print and Business Telecoms - ABC Service, Tavistock, Devon

What Are the Most Helpful Features of Windows 11?

May 23, 2022

The global damage of cybercrime has risen to an average of $11 million USD per minute, which is a cost of $190,000 each second.

60% of small and mid-sized companies that have a data breach end up closing their doors within six months because they can’t afford the costs. The costs of falling victim to a cyberattack can include loss of business, downtime/productivity losses, reparation costs for customers that have had data stolen, and more.

You may think that this means investing more in cybersecurity, and it is true that you need to have appropriate IT security safeguards in place (anti-malware, firewall, etc.). However, many of the most damaging breaches are due to common cybersecurity mistakes that companies and their employees make.

The 2021 Sophos Threat Report, which looked at thousands of global data breaches, found that what it termed “everyday threats” were some of the most dangerous. The report stated, “A lack of attention to one or more aspects of basic security hygiene has been found to be at the root cause of many of the most damaging attacks we've investigated.”

Is your company making a dangerous cybersecurity mistake that is leaving you at high risk for a data breach, cloud account takeover, or ransomware infection?

Here are several of the most common missteps when it comes to basic IT security best practices.

 

 

NOT IMPLEMENTING MUTI-FACTOR AUTHENTICATION (MFA)

Credential theft has become the top cause of data breaches around the world, according to IBM Security. With most company processes and data now being cloud-based, login credentials hold the key to multiple types of attacks on company networks.

Not protecting your user logins with multi-factor authentication is a common mistake and one that leaves companies at a much higher risk of falling victim to a breach.

MFA reduces fraudulent sign-in attempts by a staggering 99.9%.

 

 

IGNORING THE USE OF SHADOW IT

Shadow IT is the use of cloud applications by employees for business data that haven’t been approved and may not even be known about by a company.

Shadow IT use leaves companies at risk for several reasons:

  • Data may be used in a non-secure application
  • Data isn’t included in company backup strategies
  • If the employee leaves, the data could be lost
  • The app being used might not meet company compliance requirements

Employees often begin using apps on their own because they’re trying to fill a gap in their workflow and are unaware of the risks involved with using an app that hasn’t been vetted by their company’s IT team.

It’s important to have cloud use policies in place that spell out for employees the applications that can and cannot be used for work.

 

THINKING YOU’RE FINE WITH ONLY AN ANTIVIRUS APPLICATION

No matter how small your business is, a simple antivirus application is not enough to keep you protected. In fact, many of today’s threats don’t use a malicious file at all. Phishing emails will contain commands sent to legitimate PC systems that aren’t flagged as a virus or malware. Phishing also overwhelmingly uses links these days rather than file

attachments to send users to malicious sites. Those links won’t get caught by simple antivirus solutions.

You need to have a multi-layered strategy in place that includes things like:

  • Next-gen anti-malware (uses AI and machine learning)
  • Next-gen firewall
  • Email filtering
  • DNS filtering
  • Automated application and cloud security policies
  • Cloud access monitoring

 

NOT HAVING DEVICE MANAGEMENT IN PLACE

A majority of companies around the world have had employees working remotely from home since the pandemic, and they’re planning to keep it that way. However, device management for those remote employee devices as well as smartphones used for business hasn’t always been put in place.

If you’re not managing security or data access for all the endpoints (company and employee-owned) in your business, you’re at a higher risk of a data breach.

If you don’t have one already, it’s time to put a device management application in place, like Intune in Microsoft 365.

 

NOT PROVIDING ADEQUATE TRAINING TO EMPLOYEES

An astonishing 95% of cybersecurity breaches are caused by human error. Too many companies don’t take the time to continually train their employees, and thus users haven’t developed the skills needed for a culture of good cybersecurity.

Employee IT security awareness training should be done throughout the year, not just annually or during an onboarding process. The more you keep IT security front and center, the better equipped your team will be to identify phishing attacks and follow proper data handling procedures.

Some ways to infuse cybersecurity training into your company culture include:

  • Short training videos
  • IT security posters
  • Webinars
  • Team training sessions

Cybersecurity tips in company newsletters

 

WHEN DID YOU LAST HAVE A CYBERSECURITY CHECKUP?

Don’t stay in the dark about your IT security vulnerabilities. Contact us today at ABC Service in Tavistock, Devon, to schedule a cybersecurity audit to uncover vulnerabilities so they can be fortified to reduce risk.

The article is used with permission from The Technology Press.

OLDER POSTS

Does Eco-Friendly Printing Really Matter in 2026? Here’s the Green Truth

In 2026, the conversation around sustainability has shifted from a “nice-to-have” marketing buzzword to a fundamental pillar of business operations. For small to medium-sized businesses across the UK, the pressure to demonstrate environmental...

Is Your PC Due an MOT? Why Regular Servicing Saves You a Headache (and Money!)

Most of us wouldn’t dream of driving our cars for years on end without a single service or an MOT. We know that skipping that yearly check-up is a recipe for a breakdown at the most inconvenient moment possible, usually on a rainy Tuesday morning when you’re already...

Beyond the Screen: The Most Exciting Tech Breakthroughs of April 2026

It is a fantastic time to be involved in the world of technology. As we settle into April 2026, the pace of innovation isn’t just moving; it’s accelerating. Here at ABC Service, we spend a lot of our time ensuring your office Wi-Fi is snappy and your laptops are...

Beyond ‘Turn it Off and On Again’: The New Rules of Managed IT

Good IT support should do more than swoop in after something has already gone bang. For growing businesses, reactive fixes are only part of the job. The real value comes from preventing issues, improving performance, tightening security, and making sure your systems...

Email Security: Why DMARC, SPF, and DKIM Are No Longer Optional

Have you ever sent an important invoice or a time-sensitive quote to a client, only to have them tell you three days later that they “never received it”? You check your sent folder, and everything looks fine. You didn’t get a bounce-back. So, where did it...

The Dead Internet Theory: Are We Alone in the Digital Void?

Welcome to the very first edition of Tuesday Intrigue! Here at ABC Service, we spend our days fixing computers, designing stunning graphics, and ensuring your business stays connected. But as we look at the digital landscape in 2026, we’ve noticed things are getting a...

Why High-Performance Web Hosting Will Change the Way Your UK Small Business Ranks

Have you ever clicked on a link, waited three seconds for the page to load, and then immediately hit the ‘back’ button? We’ve all been there. In the fast-paced digital world of 2026, those three seconds feel like an eternity. For a small business, those...

The Dressmaker’s Guide to Stress-Free Sewing: Why Professional Pattern Printing Wins

If you have ever spent an entire evening on your living room floor, armed with a roll of Sellotape and a pair of paper scissors, painstakingly joining thirty sheets of A4 paper together, you know the “joy” of digital sewing patterns. We call it...

Tired of Being On Hold? Why a Local IT Partner Beats National Call Centres in Devon

We’ve all been there. You’re in the middle of a busy Tuesday morning in Tavistock, your internet has decided to take an unscheduled holiday, and your printer is making a sound like a tractor in distress. You call your national IT provider, only to be met with twenty...

Memory Lane is Getting Expensive: Why RAM Prices are Climbing in 2026

If you’ve popped into our Tavistock office lately or been browsing for a new laptop online, you might have noticed something a bit unsettling. The prices aren’t just creeping up; they’re leaping. Specifically, the cost of “Memory” or RAM (Random...