Please login to use this feature. You can use this feature to add the product to your favourite list.
You have added this product to your favorite list. Check My Favourite
You have removed this product from your favourite list.
Please login to use this feature. You can use this feature to add the company to your favourites list.
This company has been added successfully. Check My Favourite
This company has been removed from your favourite list.
Please login to use this feature. You can use this feature to add the company to your inquiry cart.
This company has been added to your inquiry cart.
This company has been removed from your inquiry cart.
This product has been added to your inquiry cart.
This product has been removed from your inquiry cart.
Maximum number of Product/Company has been reached in inquiry cart.
Fictron Industrial Supplies Sdn Bhd
Fictron Industrial Supplies Sdn Bhd

How to Protect Your Business from Cyber Attacks


How to guard your business from Cyber Attacks? Mitigating these threats takes above and beyond a single anti-virus upgrade; it involves ongoing vigilance. But shielding your systems doesn’t have to be complicated. Here is how to get started.
Limit Access to Your User Data & Information
Controlling having access to your valuable user data lessens the chance for human error, which is the number-one information security threat. If a worker leaves your company, or transfers to another company location, take protective action right away, including deleting passwords and accounts from all systems and collecting company ID badges and entry keys. An ounce of access prevention can equal a pound of protection when it comes to limiting the impact of a disgruntled ex-employee.
Install Surge Protectors & Uninterruptible Power Supplies
Uninterruptible power supplies (UPS) can provide just enough battery life and time to save your data in the event of a power disruption. Check to make sure the UPS type and size meets your standards and requirements. Every computer and networked device should be plugged into a UPS. For less-sensitive electronics and non-networked equipment, standard surge protectors should suffice. Make sure to test and replace each UPS and surge protector as recommended by the manufacturer.
Patch Your Operating Systems & Software Regularly
Whatever new app can open the door to a cyber attack if you don’t on a regular basis patch and update all software on every device used by your employees. Regularly check for updates when purchasing a new computer or installing a new software system. Understand that software suppliers aren't required to provide security updates for unsupported products. For example, Microsoft® will stop supporting Windows 7 in January of 2020, so if you've not up-graded yet, now is the time. Do not holdup downloading operating system updates. Updates often include new or enhanced security features.
Install & Activate Software and Hardware Firewalls
Firewalls can combat malevolent hackers and hinder employees from browsing inappropriate websites. Install and update firewall systems on every employee computer, smartphone, and networked device. Include off-site employees, even in the event you use a cloud service provider (CSP) or a virtual private network (VPN). You may also want to install an intrusion detection/prevention system (IDPS) to provide a greater level of protection.
Secure All Wireless Access Points & Networks
For secure wireless networking, use these router best practices:
- Change the new device administrative password
- Set the wireless access point so that it does not broadcast its service set identifier (SSID)
- Set your router to use WiFi Protected Access 2 (WPA-2), with the Advanced Encryption Standard (AES) for encryption
- Avoid using WEP (Wired-Equivalent Privacy).
For guest WiFi access, use a separate network from your business account.
Set up Web & Email Filters
Use email and web browser filters to dissuade hackers and restrict spam from clogging employee inboxes. You can also download “blacklist” services to block users from browsing speculative websites that pose malware risks. Caution your employees against visiting sites that are frequently linked with cybersecurity threats, such as pornographic websites or social media. This might appear to be a no-brainer; but it only takes one employee to visit the wrong website to inadvertently download malware.
Use Encryption for Sensitive Business Information
Use full-disk encryption to shield all your computers, tablets, and smartphones. Save a copy of your encryption password or key in a protected place distinct from your stored backups. Email recipients typically need the same encryption capability in order to decrypt. Never send the password or key in the same email as the encrypted document. Give it to them via phone or some other method.
Dispose of Old Computers & Media Safely
Before donating or trashing old computers, you must remove all important hard drive information. Remove any sensitive business or personal data on old CDs, flash drives, or other old media. Then destruct these items or take them to a company that will shred them for you. Destroy sensitive paper information with a crosscut shredder or an incinerator.
Train Your Employees
Cyber-vigilant employees are your best protection against information security threats.
Every employee should know:
- What business and personal use is permitted for emails
- How to treat business information at the office or at home
- What to do if a cybersecurity incident occurs
Train any new employee to protect valuable data and get them to sign your information policy. Use newsletters and/or ongoing training to boost your culture of cybersecurity. Now that we've covered the key steps to protect your valuable data and information, we will show you how to install mechanisms for detecting and recognizing a cyber attack in part three of our series on “Cybersecurity for Manufacturers” from the MEP National Network.
Main Office

Fictron Industrial Supplies Sdn Bhd
5-6, Jalan USJ 9/5Q, Subang Business Centre, 47620 UEP Subang Jaya, Selangor, Malaysia.



Other Office

Selangor Office
36, Jalan Puteri 5/12, Bandar Puteri, 47100 Puchong, Selangor, Malaysia.

Penang Office
44A Jalan Besi, 11600 Green Lane, Penang, Malaysia.


Hello! Thanks for visiting my site. Please press Start button to Contact with Admin :)


Browse by : Home - Classifieds - Companies - Location - Tags - Products - News & Promotion - Job Vacancy - Mobile Website - Google - SEO Results

All Shop List from NEWSTORE in Malaysia

  • FR 324
  • CN 244
  • US 134
  • RU 77
  • MY 61
  • IE 7
  • SG 3
  • AU 3
People Online
Our PackageContact Us