Language
  • English (UK)
  • Please take this Free Quiz to find out what your Cyber Security weak spots are.

    When you complete the quiz you’ll get your personalised Cyber Safety Guide, pointing you in the right direction.  

    Your customized guide will tell you how to set up the Free security features on your devices, applications and networks based on the weak spots we identify in your responses. 

     Click below to start the quiz - it should only take 2 to 5 minutes to complete.

    We guarrantee 100% Privacy.  Your information will NOT be shared.

     

  • Include anyone who has access to your data, devices or systems, whether they are paid or unpaid.
  • A strong password is usually one that would be difficult to guess and DOES NOT include any combination of personal information, popular words or number sequences (e.g. don't use 'qwerty' or 'liverpool123')
  • This could include email, social media, HMRC/tax accounts or any other online accounts critical to the running of your business.
    If you're not sure what 2FA is, watch our 30 second video guide
  • Important information could include emails, invoices, accounts, customer data, appointments and software.
    Backup could include information saved to the cloud or an external hard drive or USB stick.
  • Please pick the best option that applies to your usage

  • Firewall and anti-virus are security features that are built into Windows and macOS, and can be found in your computer's settings. However, you may have also chosen to purchase a product that provides these, or additional features, from a third party.
  • Screen to auto-lock after a period of inactivity
    PIN code, passcode, fingerprint, face ID (or other biometric) to access your device
    Find my device (for Apple devices)
    Play protect (for Android devices)
  • Software includes:
    The device's operating system
    Any apps on the device
  • Software includes:
    The device's operating system
    Any apps on the device
  • This may include checking it's from a well known brand, performing a web search or only downloading from a manufacturer approved store such as Apple App store or Google Play.
  • You have completed your Quiz!

    We’re ready to show you your personalised Cyber Safety Guide
  • Your Personalised Cyber Security Guide

  • Thank you for completing our quiz: What are your Cyber Security Weak spots and how can you fix them?

     

    If you follow the personalized recommendations below your business will be a great deal safer.

     

    We wish you well as you boost the strength of your cyber security.

    The Security Everywhere Team

  • Educate your employees

    Everyone who has access to your business information should understand how they can help keep hackers locked out.

    Equip your employees with the knowledge they need to defend your business from attack with Cyber Awareness Training or ask an expert to help with this.

  • Change your email password
    If you don't have a strong password, or it is the same as other accounts, it is easier for a hacker to access your email.

    Once they have acces, they can:

    • Access your other accounts and change their passwords, blocking your access
    • Use your mail accounts to pretend to be you, using your email address to steal from your clients and contacts

    Here is one way to create and use a strong password which can be used across all your accounts:

    • Create strong passwords using 3 random words (opens in a new tab)
  • Turn on two-factor authentication (2FA) for all your important work accounts
    Two or Multi-Factor Authentication is basically an additional way to prove your identity, such as a code that gets generated on your phone.

    When you enable 2FA on your accounts, even if a hacker has discovered your password, this will make it much more difficult for them to gain access.

    2FA is essential for the things you simply cannot afford to have hacked. This includes online banking and your main email account. Online banking should have 2FA enabled by default. For more information, contact your bank.

    For some accounts, you can choose to only activate 2FA when signing into your account from a new device.

    Here's how to enable 2FA on some popular email platforms:

    • Gmail (opens in a new tab)
    • Yahoo (opens in a new tab)
    • Outlook (opens in a new tab)
    • AOL (opens in a new tab)
    • Apple (opens in new tab)
  • Back up all your important work information
    Having a backup of all your important information will help your business recover more quickly from a cyber attack.

    Because you'll be out of action for less time, this may also minimise any financial impact.

    For more information read our Small Business Guide (opens in a new tab)

  • Turn on automatic backups
    Enabling automatic backups is the most reliable way to ensure you have a recent copy of all your important data in the event of a cyber attack or a technical failure.

    Automated backups save you the time needed to supervise the manual copying of files. You can often schedule the backup to happen outside of work hours, and you will never forget to do a backup.

    Here's how to turn on automatic backup for:

    • Apple - Mac (opens in a new tab)
    • Apple - iPhone and iPad (opens in a new tab)
    • Android (opens in a new tab)
    • Microsoft Windows 10 and Windows 8 OneDrive (opens in new tab)
  • Practice recovering important information from your backup
    Knowing how to restore from your backup will help you to recover as quickly as possible from a cyber attack or technical failure.

    Test the restore in a way that simulates your computer systems having been erased by a virus.

    For example, you could attempt to retrieve an important email from your backup.

    You will need to know:

    • Where your backup is kept - is it kept on a hard drive or in the cloud?
    • Any passwords - do you have to log in to a service or decrypt the files?
    • Do you need any special software to do the restore?
    • Are you restoring to somewhere safe.  If you've been hacked, are you sure your computer is now safe to restore to?
  • Unplug your USB connected hard drive when not performing a backup
    This will prevent a hacker from reaching your backup if they have been able to hack your computer.

    Consider setting up a routine to back up your important information regularly to your USB connected hard drive. This will ensure that you have a recent copy of all your important data in the event of a cyber attack or a technical failure.

  • Turn on automatic updates for all your devices
    Out of date software, apps and operating systems contain weaknesses which make them easier to hack. The best way to protect against this is to enable automatic updates, wherever possible.

    Automatic updates will minimise the time between a weakness being discovered and your computer being updated to fix the weakness. This closes the hacker's window of opportunity as quickly as possible.

    Updates can often be scheduled to happen outside of work hours to minimise their inconvenience. If you do this, you will need to leave your device switched on so that the update can take place.

    Here's how to turn on automatic updates for:

    • Apple - Mac (opens in a new tab)
    • Apple iPhone or iPad (opens in a new tab)
    • Microsoft Windows 10 (opens your MS settings)
    • Windows 7 is no longer supported. You should upgrade to Windows 10 ( opens in a new tab )
    • Android smartphone or tablet (opens in a new tab)
    • Android apps (opens in a new tab)

    Some software may require you to update manually. You should do this regularly.

  • Turn on the security features on all your devices
    Devices like smartphones, tablets and PCs are getting more and more secure, but hackers are getting better at attacking them too.

    So if you've just bought a new device, or haven't looked at your security settings for a while, you should check the following are switched on for your main work devices:

    • PIN code, password, fingerprint or face ID to access your device
    • Set your screen auto-lock after a period of inactivity
    • 'Find My Device' (opens in a new tab) or similar so you can track your device if it's lost or stolen
    • Play Protect (opens in a new tab) if you're using Android devices

    Here are 'how-to' guides from major manufacturers:

    • Apple (opens in a new tab)
    • Google (Android) (opens in a new tab)
    • Samsung (opens in a new tab)
    • Microsoft (opens in a new tab)
  • Turn on your computer's firewall and enable anti-virus protection, where provided
    A firewall guards the border between your computer and the internet, constantly watching for suspicious activity.

    Anti-virus looks inward, searching your computer for viruses, stopping any it finds.

    Here's how to turn on the firewall:

    • Apple (opens in a new tab)
    • Windows 10 (opens in a new tab)
    • Windows 8 (opens in a new tab)

    Here's how to enable anti-virus:

    • Windows 10: Stay protected with Windows Security (opens in a new tab)
    • macOS: Protect your Mac from malware - Apple Support (opens in a new tab)
  • Update your main work devices to the latest software, where possible
    Out of date software, apps and operating systems contain weaknesses which make them easier to hack.

    Keeping all your devices up to date makes you a harder target for hackers. Updates fix weaknesses but will also provide performance improvements and new features.

    Devices that are out of date are much easier to hack.

    You don't need to buy the latest (or most expensive) model to stay safe, but if possible, avoid using devices that are no longer supported by the manufacturer (or whose support period will end soon).

  • Always check that software you download is from an official source
    You should only download software and apps from official stores, like Google Play or the Apple App Store. These stores will scan the software for viruses before they make it available, giving you peace of mind that the software you download is safe to install.

    If you want to install software from elsewhere, you should do your best to check the source is genuine. There is no way to be 100% certain about this, but there are a few things you can do:

    • Research the brand, developer or vendor, if they are new to you
    • Check the URL for the download site carefully
    • Look for reviews of the software
    • Beware of things that seem potentially too good to be true, like massive price discounts and promises to 'fix' the speed of your internet connection
  • Well done, based on the answers you provided, we haven't identified any actions to implement.

  • If you’d like to receive our Standard Cyber Security Guide, please click the button below.

    Unlike the onscreen guide here, it won’t be personalised but you might find it useful.

     

    The bit about privacy: by requesting our Standard guide you agree to receive additional emails from us with safety tips and special offers. You can unsubscribe at any time using the links in the emails.
    .

  • Should be Empty: