<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.actisofttechnology.com/blogs/best-practice/feed" rel="self" type="application/rss+xml"/><title>ActiSoft Technology - Blog , Best Practice</title><description>ActiSoft Technology - Blog , Best Practice</description><link>https://www.actisofttechnology.com/blogs/best-practice</link><lastBuildDate>Wed, 22 Apr 2026 17:12:35 +0200</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[The Power of Password Managers: Safeguarding Your Digital World]]></title><link>https://www.actisofttechnology.com/blogs/post/the-power-of-password-managers-safeguarding-your-digital-world</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-840534924.jpg"/>In today's digital age, where our lives are increasingly intertwined with the online world, ensuring the security of our personal information has beco ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_EXvjOvRFQK2Qa-o7QCvbfg" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_EXvjOvRFQK2Qa-o7QCvbfg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_b6mwa3k0TRKxytMeSsxzNg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_IBa9g3NxTrOunKX53tlVRQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_IBa9g3NxTrOunKX53tlVRQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm__fC8aOK-RluvFlFbgY1Rxw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm__fC8aOK-RluvFlFbgY1Rxw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><span style="color:inherit;">In today's digital age, where our lives are increasingly intertwined with the online world, ensuring the security of our personal information has become paramount. A crucial aspect of protecting our digital assets is creating and managing strong, unique passwords for every online account. Yet, remembering multiple complex passwords can be a daunting task. This is where password managers come to the rescue, offering convenience, peace of mind, and fortified protection against a range of cyber threats. In this blog, we explore the benefits of using a password manager and the threats they effectively shield us from.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_RFzEKaheaKnKlwXnktoxow" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_RFzEKaheaKnKlwXnktoxow"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_usHCiIasw2fC5GeCnpnSZw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_usHCiIasw2fC5GeCnpnSZw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_3i3yy9s4FjCITJW87lERMg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_3i3yy9s4FjCITJW87lERMg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_aWVEKoePH3OOuEW2-_xDCQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_aWVEKoePH3OOuEW2-_xDCQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">What are the Benefits to Using a Password Manager</span></h3></div>
<div data-element-id="elm_jeeasBK5H7-lo9m6TUpNuw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_jeeasBK5H7-lo9m6TUpNuw"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Enhanced Security</span></h4></div>
<div data-element-id="elm_LBH1aSp2QqgWMY3nQjVf6A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LBH1aSp2QqgWMY3nQjVf6A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Password managers generate strong, randomised passwords for each of your online accounts, significantly reducing the risk of unauthorised access. Unlike using predictable passwords or reusing the same one across multiple sites, which can make all your accounts vulnerable if one is breached, a password manager keeps each password unique and encrypted.</span><br></p></div>
</div></div></div></div></div><div data-element-id="elm_cifmx2x-NWST4R3su0X9-A" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_cifmx2x-NWST4R3su0X9-A"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_PpIfYxVBjUzMX9HQwBekCQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_PpIfYxVBjUzMX9HQwBekCQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_FlGzSsUQEcZe_phPpiSRsw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_FlGzSsUQEcZe_phPpiSRsw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_DLTTu3O3FBH6LxMPOlPoSg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_DLTTu3O3FBH6LxMPOlPoSg"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Convenience and Time-Saving</span></h4></div>
<div data-element-id="elm_JJmMX5_uoUqvp3NoiT00mA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_JJmMX5_uoUqvp3NoiT00mA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">With a password manager, you no longer need to memorise or write down passwords on sticky notes. Instead, you only need to remember one master password to access the password manager itself. This saves valuable time and reduces the frustration of struggling to remember numerous passwords.</span><br></p></div>
</div></div></div></div></div><div data-element-id="elm_KgoQabR3CQyb2u0GHOG3qA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_KgoQabR3CQyb2u0GHOG3qA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Pnt1rz8sfFZbLEFu5HgnKg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_Pnt1rz8sfFZbLEFu5HgnKg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_J5Momqu9ahZSW8ViKI8yYA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_J5Momqu9ahZSW8ViKI8yYA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_U8zVGWLOXEviRRlOjjfn_A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_U8zVGWLOXEviRRlOjjfn_A"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Password Strength Analysis</span></h4></div>
<div data-element-id="elm_oyT6VverRpTbXLtGy0Mzgw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oyT6VverRpTbXLtGy0Mzgw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">A password manager often includes features that analyse the strength of your existing passwords and identify any weak or duplicate ones. It helps you rectify these issues and reinforces your overall security posture. Better ones alert you to any passwords that may have been breached.</span><br></p></div>
</div></div></div></div></div><div data-element-id="elm_vJcyvPExfJ4CQIQmQviZLA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_vJcyvPExfJ4CQIQmQviZLA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_8YudU30mH19-N18lAKHbuQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_8YudU30mH19-N18lAKHbuQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_ISPRg5eigGwf8wrrcn8XIQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_ISPRg5eigGwf8wrrcn8XIQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_2sEFn-v6hlLFaZK2wHFdiA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_2sEFn-v6hlLFaZK2wHFdiA"] .zpimageheadingtext-container figure img { width: 200px ; height: 200.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_2sEFn-v6hlLFaZK2wHFdiA"] .zpimageheadingtext-container figure img { width:200px ; height:200.00px ; } } @media (max-width: 767px) { [data-element-id="elm_2sEFn-v6hlLFaZK2wHFdiA"] .zpimageheadingtext-container figure img { width:200px ; height:200.00px ; } } [data-element-id="elm_2sEFn-v6hlLFaZK2wHFdiA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-1218619602.jpg" data-src="/Images/Small/iStock-1218619602.jpg" width="200" height="200.00" loading="lazy" size="small" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="color:inherit;">Cross-Device Synchronisation</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;font-size:18px;">Most password managers offer synchronisation across various devices, ensuring that your passwords are accessible and up-to-date wherever you go. This feature allows for seamless access across smartphones, tablets, and computers.</span><br></p></div>
</div></div></div></div></div></div></div><div data-element-id="elm_4NPTtdgM00IVwOq73THJFg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_4NPTtdgM00IVwOq73THJFg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_F2Nj-Fwa5AOVRCAG7WBlFg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_F2Nj-Fwa5AOVRCAG7WBlFg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_RjKka4H5TTY5aROVEycCiA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_RjKka4H5TTY5aROVEycCiA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_LbwU56T1pfy797sKOBVIpA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_LbwU56T1pfy797sKOBVIpA"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Auto-Fill Functionality</span></h4></div>
<div data-element-id="elm_TuRwHo7c5x7aVmcsfitnSw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_TuRwHo7c5x7aVmcsfitnSw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Password managers can auto-fill login credentials for you, streamlining the login process and reducing the chance of typing errors that might lead to accidental exposure of sensitive information.</span><br></p></div>
</div></div></div></div></div><div data-element-id="elm_kd2GWyLGDylTC-yjs1jCJg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_kd2GWyLGDylTC-yjs1jCJg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_wcuD7mOhc4Q6rKHRE-5Y3A" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_wcuD7mOhc4Q6rKHRE-5Y3A"].zprow{ border-radius:1px; } </style><div data-element-id="elm_VoKnBcI1grAcGDorAfnhcg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_VoKnBcI1grAcGDorAfnhcg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_0EYZM7diWChdqgZRiQbY6A" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_0EYZM7diWChdqgZRiQbY6A"] .zpimage-container figure img { width: 1095px ; height: 365.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_0EYZM7diWChdqgZRiQbY6A"] .zpimage-container figure img { width:723px ; height:241.00px ; } } @media (max-width: 767px) { [data-element-id="elm_0EYZM7diWChdqgZRiQbY6A"] .zpimage-container figure img { width:415px ; height:138.33px ; } } [data-element-id="elm_0EYZM7diWChdqgZRiQbY6A"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/password-manager" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Keeper%20Email%20Banner%201.png" width="415" height="138.33" loading="lazy" size="fit"/></picture></a></figure></div>
</div></div></div></div></div><div data-element-id="elm_WFsCCsQWJUJNJ0J__tN1tA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_WFsCCsQWJUJNJ0J__tN1tA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_hKO0xzglTnCbdf1KiQVeKA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_hKO0xzglTnCbdf1KiQVeKA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_Y1IWkLaO0_AceQCRPDz1bw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Y1IWkLaO0_AceQCRPDz1bw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_HHencI79M0c53aOAzJvmeA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_HHencI79M0c53aOAzJvmeA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Threats Password Managers Protect Against</span></h3></div>
<div data-element-id="elm_2fLQG8lbLgb80GDa0vBWhQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_2fLQG8lbLgb80GDa0vBWhQ"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Phishing Attacks</h4></div>
<div data-element-id="elm_VtdjlUWx4XsaKDe5YEAlig" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_VtdjlUWx4XsaKDe5YEAlig"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><a href="/what-is-phishing" title="Phishing" target="_blank" rel="">Phishing</a> remains one of the most common cyber threats, where attackers use fake websites to steal login information. Password managers help combat this by automatically recognising the correct URLs and refusing to auto-fill credentials on malicious sites.</span><br></p></div>
</div></div></div></div></div><div data-element-id="elm_EmV5HG-9uPqItcFr1c-V3g" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_EmV5HG-9uPqItcFr1c-V3g"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_9XsHB_kKMwLPYbq3LZcIsg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_9XsHB_kKMwLPYbq3LZcIsg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_ftTLMZvNnK7M9R9Q3ALBYw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_ftTLMZvNnK7M9R9Q3ALBYw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_C_6oNNv70SGi3G-Q45B5pw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_C_6oNNv70SGi3G-Q45B5pw"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Credential Stuffing</span></h4></div>
<div data-element-id="elm_dM6Kr335drzbIbGnkSIrOA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_dM6Kr335drzbIbGnkSIrOA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">In a credential stuffing attack, hackers use combinations of usernames and passwords from previous data breaches to gain unauthorised access to multiple accounts. Password managers thwart this threat by ensuring each account has a unique, strong password.</span><br></p></div>
</div></div></div></div></div><div data-element-id="elm_r_fuuvnwgcj6KlvsUJPfkg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_r_fuuvnwgcj6KlvsUJPfkg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_nN36JEnRmIGnsMCl879Bew" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_nN36JEnRmIGnsMCl879Bew"].zprow{ border-radius:1px; } </style><div data-element-id="elm_6tZNxHDHsFJzlh88lnWEIA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_6tZNxHDHsFJzlh88lnWEIA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_tO3LGfe3ZTVx709TUvrYtw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_tO3LGfe3ZTVx709TUvrYtw"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Keylogging</span><br></h4></div>
<div data-element-id="elm_vRhTJVlOIFN4ZqC_7GLGFA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vRhTJVlOIFN4ZqC_7GLGFA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Keyloggers are malicious software that record keystrokes, allowing hackers to capture sensitive information like passwords. Password managers mitigate this risk by auto-filling passwords, bypassing the need for manual typing.</span><br></p></div>
</div></div></div></div></div><div data-element-id="elm_Th4AeyvoT61vHlaAf0IMJw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Th4AeyvoT61vHlaAf0IMJw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_0l3x6VDn-YKJnl_PaVMAKQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_0l3x6VDn-YKJnl_PaVMAKQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_3zIX5P6CqJl7-Lzhmkng5Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_3zIX5P6CqJl7-Lzhmkng5Q"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_XMFlhKG8qKC8cz6O0DQprw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_XMFlhKG8qKC8cz6O0DQprw"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Shoulder Surfing</span></h4></div>
<div data-element-id="elm_e8COeaUe5g3MbzHVTmpRrA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_e8COeaUe5g3MbzHVTmpRrA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">In crowded places, attackers might watch over your shoulder to steal passwords as you type them. Password managers minimise this risk by eliminating the need to manually enter passwords.</span><br></p></div>
</div></div></div></div></div><div data-element-id="elm_nLMK-tOa7ih4AEW0XnVhaw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_nLMK-tOa7ih4AEW0XnVhaw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_4c5WpyqMRqyS3wH1IYRqsA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_4c5WpyqMRqyS3wH1IYRqsA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_VmjZIEEpfzAMDvdpid724Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_VmjZIEEpfzAMDvdpid724Q"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_rZGF5OSbTposSQ8DqmBhsA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_rZGF5OSbTposSQ8DqmBhsA"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Insider Threats</span></h4></div>
<div data-element-id="elm_VTp1HuEgVgRMV20u_iD6ug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_VTp1HuEgVgRMV20u_iD6ug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Password managers protect against internal threats by limiting access to sensitive information. Organisations can restrict access to the password manager's master password, ensuring only authorised personnel can retrieve the stored credentials.</span><br></p></div>
</div><div data-element-id="elm_vLTMXaacGPVzheMZ3A7BEQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_vLTMXaacGPVzheMZ3A7BEQ"] div.zpspacer { height:48px; } @media (max-width: 768px) { div[data-element-id="elm_vLTMXaacGPVzheMZ3A7BEQ"] div.zpspacer { height:calc(48px / 3); } } </style><div class="zpspacer " data-height="48"></div>
</div></div></div></div></div><div data-element-id="elm_AcCtm-uGmgO0K3nxoXvRUg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_AcCtm-uGmgO0K3nxoXvRUg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_QCaKSS-Bvmuc8YdGigngAw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_QCaKSS-Bvmuc8YdGigngAw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_IbZncAWoXYW08s7WDvspNg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_IbZncAWoXYW08s7WDvspNg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_Bg6HEplmJWq4LJH5Q-V8lA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Bg6HEplmJWq4LJH5Q-V8lA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="color:inherit;">The adoption of a <a href="/password-manager" title="password manager" target="_blank" rel="">password manager</a> is a critical step towards fortifying your digital security and safeguarding your sensitive information. By generating strong, unique passwords, protecting against various cyber threats, and offering convenient access to your online accounts, password managers prove to be indispensable tools in the fight against cybercrime. Embrace the power of password managers and take control of your digital world with confidence and peace of mind. Remember, your passwords are the gatekeepers to your online world, and with a password manager, you hold the keys to their fortified protection.</span><br></p><p><br></p><p><span style="color:inherit;">81% of breaches are due to a failure to secure passwords, credentials and secrets, you can remove that risk by adding a password manager to your security stack.&nbsp;</span><span style="color:inherit;">It's an excellent addition to your multi-layered security.</span><br></p></div></div>
</div><div data-element-id="elm_YxVPolMOsUEjQDLKBB8Cxw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_YxVPolMOsUEjQDLKBB8Cxw"] div.zpspacer { height:39px; } @media (max-width: 768px) { div[data-element-id="elm_YxVPolMOsUEjQDLKBB8Cxw"] div.zpspacer { height:calc(39px / 3); } } </style><div class="zpspacer " data-height="39"></div>
</div><div data-element-id="elm_7sGx5THkUiSo7sy40nFi_g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_7sGx5THkUiSo7sy40nFi_g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>At Actisoft Technology we look to make you secure so that you can Work From Anywhere (WFA) not just in the office or at home, take your protection with you wherever you go.</p><p><br></p><p>Talk with us about how Keeper <a href="/password-manager" title="password manager" target="_blank" rel="">password manager</a> can help you mitigate the risk to your organisation from weak passwords.</p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 01 Aug 2023 13:47:33 +0000</pubDate></item><item><title><![CDATA[An Overview of Business Reasons to Achieve a Compliance Standard]]></title><link>https://www.actisofttechnology.com/blogs/post/an-overview-of-business-reasons-to-achieve-a-compliance-standard</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-985183722.jpg"/>One of the biggest reasons to achieve a compliance standard is to win and retain business, setting yourself apart from the competition by showing that ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_P6KjZY57SZS3C2m14MrTSg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_TUoljI_jTnqYT7N0JAooVQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_LlTCETznR_umPGhxbCUBYQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_A9_XmQT2TQW64I1aUq0Jfg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_A9_XmQT2TQW64I1aUq0Jfg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Compliance Brings Benefits</h2></div>
<div data-element-id="elm_-nQiSi_6RyqVr4kIWreZMw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-nQiSi_6RyqVr4kIWreZMw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);">One of the biggest reasons to achieve a compliance standard is to win and retain business, setting yourself apart from the competition by showing that you have met a level of quality/security, as an example.</span></div><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);"><br></span></p><div><div><span style="font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);">It can be a requirement for obtaining Government or Public body contracts or allow you to at least bid for them. A lot of Government contracts stipulate that you need to have <a href="https://www.ncsc.gov.uk/cyberessentials/overview" title="Cyber Essentials" target="_blank" rel="">Cyber Essentials</a>.</span></div></div><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);"><br></span></p><div><div><span style="font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);">Let’s briefly look at the potential benefits of achieving the <a href="https://www.lawsociety.org.uk/topics/firm-accreditations/lexcel/" title="Lexcel Standard" target="_blank" rel="">Lexcel Standard</a> which is the Law Society’s legal practice mark.</span></div></div><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);"><br></span></p><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><span style="font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);">•Increased retention rates of clients due to a superior customer service experience,</span></div></blockquote><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><span style="font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);">•As an organisation you will have a more effective risk management process which will result in fewer complaints,</span></div></blockquote><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><span style="font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);">•It will provide you with a competitive advantage,</span></div></blockquote><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><span style="font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);">•Having the Lexcel Standard of Compliance can help you to stand out from competitors during a bidding process,</span></div></blockquote><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><span style="font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);">•Increased profitability and efficiency,</span></div></blockquote><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><span style="font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);">•Access lower insurance premiums and receive favourable treatment from insurers.</span></div></blockquote><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);"><br></span></p><div><span style="font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);">The benefits can be the same for any Compliance Standard that you achieve especially Industry specific ones.</span></div><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);"><br></span></p><div><div><span style="font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);">Some Compliance Standards have to be achieved for some business operations such as <a href="https://www.pcisecuritystandards.org/" title="PCI DSS" target="_blank" rel="">PCI DSS</a> Compliance which means you can process and handle credit card transactions and their associated data. With more card transactions happening due to the COVID19 Pandemic have you achieved this Compliance Standard? It is not a one-off exercise it has to be managed and ensured that compliance is being met all the time, if you are not compliant you can lose the ability to process credit card transactions, what impact would that have on your business?</span></div></div><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);"><br></span></p><div><div><span style="font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);"><a href="https://www.handbook.fca.org.uk/handbook/SYSC/6/1.html" title="FCA" target="_blank" rel="">FCA</a> Compliance is a Statutory requirement for organisations that operate within Financial Services so maintenance of this is second nature as they must have it to operate within that sector.</span></div></div><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);"><br></span></p><div><div><span style="font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);">Remember that all the above Compliance standards are over and above your requirement to be <a href="https://gdpr.eu/" title="GDPR" target="_blank" rel="">GDPR</a> compliant! That can mean a lot of time spent on managing compliance.</span></div></div><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);"><br></span></p><div><span style="font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);">No compliance standard is a one-off exercise, it’s a continual process. Inevitably, it can get added as an additional responsibility to someone’s ever-growing workload which means the management of the compliance standard can become all-consuming, impacting productivity and efficiency as well as increasing costs. Achieving a Compliance Standard is something you should enter into with eyes wide open.</span></div></div>
</div><div data-element-id="elm_jNeoEOVAG5MmRYYWIiR_Dg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_jNeoEOVAG5MmRYYWIiR_Dg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-836453798.jpg" size="medium" alt="Be aware of and control your risk" data-lightbox="true" style="width:728px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><div><span style="font-size:18px;font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);">A lot of standards have the same controls to be implemented and because the standard covers different business areas or units you can have multiple people duplicating tasks instead of in tandem, together as a team. As an example, you may end up with the person who is responsible for business insurance being tasked twice or more with providing copies of insurance policies therefore duplicating the task and effort for them. This can happen in any size of business. This decreases the efficiency and productivity of all involved and can make compliance seen as a negative task as opposed to the positive task that it is with the benefits it brings.</span></div><p><span style="font-size:18px;font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);"><br></span></p><div><span style="font-size:18px;font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);">Creating a Compliance/Security culture within your organisation will make it become second nature so removing any negative outlook from the process is important to success, take people along the journey, dragging them doesn’t work so well!</span></div><p><span style="font-size:18px;font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);"><br></span></p><div><span style="font-size:18px;font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);">Achieving a Compliance Standard can be costly both in time and money, but the benefits can outweigh those costs if you are able to manage the process efficiently and continually as opposed to a last minute panic!</span></div><p><span style="font-size:18px;font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);"><br></span></p><div><span style="font-size:18px;font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);">Keeping key stakeholders updated with progress is a key factor for several reasons, to ensure that any required resources are made available and they can be your champion in making any necessary business process changes, these are a small example.&nbsp;</span></div><p><span style="font-size:18px;font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);"><br></span></p><div><span style="font-size:18px;font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);">Meeting, and exceeding, Compliance Standards adds value to your organisation if not viewed and treated as a chore.&nbsp;</span></div></div><div><span style="font-size:18px;font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);"><br></span></div><div><span style="font-size:18px;font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);"><br></span></div><div><span style="font-size:18px;"><div><span><div><span><div><span><div><span><div><span><span style="font-style:italic;font-family:&quot;Open Sans&quot;, sans-serif;color:rgb(1, 42, 83);">Actisoft Technology offers a Compliance Management software solution, please see our product page – <a href="/compliance-manager" title="Compliance Manager." rel="">Compliance Manager.</a> We also offer Cyber Security <a href="/services" title="Services" rel="">Services</a> and <a href="/products" title="Products" rel="">Products</a>, including <a href="/security-awareness-training" title="Security Awareness Training" rel="">Security Awareness Training</a>, to ensure that you can Work Securely, Everywhere, Everytime. This works whether you are in an office, from home and even the local coffee shop. Talk to us about how we can partner to ensure that your business is secure from current, new and emerging threats.</span><br></span></div></span></div></span></div></span></div></span></div></span></div></div>
</div></div><div data-element-id="elm_v7Io_8SBQ_OdvhCR80UwSw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_v7Io_8SBQ_OdvhCR80UwSw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://forms.zohopublic.eu/actisofttechnologycom/form/IwouldliketoknowmoreaboutComplianceManager/formperma/H-HV2bvS4PBsFpASrCxLpj1_jTyL8K3c-sW_cktLQ3I?referrername=compliance_blog_1" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 03 Jul 2020 08:02:37 +0000</pubDate></item><item><title><![CDATA[The Security Risks of Working from Home]]></title><link>https://www.actisofttechnology.com/blogs/post/the-security-risks-of-working-from-home</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.comhttps://images.unsplash.com/photo-1547472751-ee012a99b3c9?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ"/>With users now outside of the corporate firewall and outside of the office environment your risk surface will have increased. Add the ever-growing lis ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OjutFgLOQwCAhsnXnptYdA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_WJoZ66JXTb28wFFT0JtYyg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_4nJRffeqQOiI_-2I5bQ86Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_4nJRffeqQOiI_-2I5bQ86Q"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm__e5TfsFgRcKnLtDUVCryGg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm__e5TfsFgRcKnLtDUVCryGg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">What Should I be Considering?</h2></div>
<div data-element-id="elm_9WTWuGwnSkW-oFQzYJUVHg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_9WTWuGwnSkW-oFQzYJUVHg"].zpelem-text { color:#012a53 ; border-radius:1px; } [data-element-id="elm_9WTWuGwnSkW-oFQzYJUVHg"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#012a53 ; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;">With users now outside of the corporate firewall and outside of the office environment your risk surface will have increased. Add the ever-growing list of collaboration apps now used it has never been more important than now to consider the risk and threat to your business.</span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><br></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Do you foresee working from home being a more regular occurrence? Have you resisted employees working from home in the past?</span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><br></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;">You may be considering making this more allowable than in the past, but you need to consider the increase in cyber risk, can you mitigate them? Yes, you can. In partnership with your users you can help them to work securely from home, that has always been a possibility. With a robust Remote Working Policy, you can ensure that your business is as well protected remotely as it is in the office.</span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;">What are the main considerations I hear you ask?&nbsp;</span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><br></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;">With threats forever evolving a multi-layer of security is the best way to mitigate your risk, but you already know that?</span></p><ul><ul><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Train your users on how to spot a Phishing/Malicious communication, outside of the office they will not necessarily have their normal work colleague/s to ask if an email is genuine or not. Your users will also be more relaxed working from home, we’ve all heard of attendees in web meetings only wearing a presentable top half! Don’t let that relaxation become a security lapse.</span></li></ul></ul><ul><ul><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Secure the home router! Most users will still have the default admin credentials in place, the password information is often easily found on the internet.&nbsp;</span></li></ul></ul><ul><ul><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Passwords are an issue either side of the corporate firewall, purchase a Password Manager for your users, allow them to also use it for personal accounts. This will maintain a good level of password hygiene. One that can generate secure passwords is best. With more collaboration apps being used it increases the risk of password reuse across platforms. It is not recommended to store passwords in browsers. <a href="https://www.howtogeek.com/447345/why-you-shouldnt-use-your-web-browsers-password-manager/">Article</a>.</span></li></ul></ul><ul><ul><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Make use of Two-Factor/Multi-Factor Authentication everywhere that it is available and dependent upon the size of your organisation consider Identity &amp; Access Management for access to corporate resources &amp; apps. Recommend that users also enable 2FA/MFA for all their accounts where available. Don’t just aim security advice at corporate use, aim to get users to build it into all aspects of their digital life, long-term, the users and company will benefit from this approach.</span></li></ul></ul><ul><ul><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Communicate to users the apps that are allowable for collaboration and restrict usage of non-approved tools. Guide your users and make sure that they are aware of what has now become a corporate tool.</span></li></ul></ul><ul><ul><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Endpoint protection, no machine should be without this! Can you manage your endpoint protection remotely? A cloud-based product will allow easier management and ensure that your users have protection everywhere they work from whether that be in the office or remotely. Threats evolve quickly and a product with good Threat Intelligence behind it will improve your security posture.</span></li></ul></ul><ul><ul><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Reduce the malicious emails hitting your user’s mailbox by having an Email Secure Gateway. They can’t click on a dodgy link if they don’t get it in the first place!</span></li></ul></ul><ul><ul><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Make use of a good VPN ensuring that they have a secure connection over the internet irrespective of where they are working. Make sure that it can be managed remotely.</span></li></ul></ul><ul><ul><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Use a DNS Web Content filtering service to prevent access to dangerous and unwanted content. You possibly already have these content rules set up on your corporate firewall, but they need to be at client level to ensure that the same level of protection follows the users wherever they are working. They can also stop traffic going to malicious sites if a dodgy link is clicked on.</span></li></ul></ul><ul><ul><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Use a Remote Management &amp; Monitoring product to ensure that you can manage your endpoints remotely, keep them up to date with patches &amp; be aware of what software is installed on them along with other activities that you need to do to maintain good security posture.</span></li></ul></ul><ul><ul><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Backup, Backup &amp; Backup! A preventative approach to security is the best way to go but a good tried and tested backup can always save the day. Are your users saving more documents to their desktop now they are working from home? Backup your user machines as well as file storage, servers, databases etc to give you all round coverage.</span></li></ul></ul><ul><ul><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">How do your users get rid of electronic information, do they just use the Windows delete function and clear out their recycle bin? Look at implementing a secure erasure process using available tools and set an organisation policy for the destruction of electronic information.</span></li><li><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Don't forget to ensure that all aspects of your insurance will cover you whilst employees work from home.</span></li></ul></ul><div><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><br></span></div><div><span style="color:inherit;"><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;">This is by no means a comprehensive list but gives you a good start in maintaining security wherever your users are working.</span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><br></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Over the years business has been moving to a more mobile approach and the current crisis is going to accelerate that process, are you ready for that change?</span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><br></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Where to start?</span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><br></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Review your current security posture and asses your current risks and how they will change, how agile is your security? Will your security products cause productivity issues being used outside of the firewall?</span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><br></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Don’t forget about your users, there is a lot to consider. Think about how working from home will impact them, many will work more hours than they normally would. Technology doesn’t sleep and is available 24/7 but your users aren’t, and neither are you! Careful consideration should be taken to set guidelines to ensure that your teams are not over doing it as this can lead to mental health problems, I know that all too well from my own experiences. Have the ability to see if the guidelines are being followed.</span></p><p><span style="color:inherit;font-family:&quot;Open Sans&quot;, sans-serif;"></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><br></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;">Your users may also spend more time on Social Media whilst working from home which can also have negative effects - <a href="https://www.psychologytoday.com/us/blog/talking-about-men/202002/social-media-and-mental-health-time-digital-detox">Article</a>. There is no easy answer for this other than trying to educate your teams. Don’t just leave them to it, guide and support them through it, although some may have been asking for remote working in the past it can take a while to get a good routine going and it’s very easy to let that slip, we’ve all had a gym membership that hasn’t seen the outside of it’s holder at times! <a href="https://www.webroot.com/blog/2020/05/01/mental-health-and-mindful-tech/">Article</a>.</span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><br></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><span style="color:inherit;">Reach out to have a chat about any concerns or questions you may have, we love to find out how others are securing their business and any pitfalls they have come across that may help others in a similar position or situation</span><br></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><br></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;"><br></span></p><p><span style="color:inherit;font-family:&quot;Open Sans&quot;, sans-serif;"></span></p><p><span style="font-family:&quot;Open Sans&quot;, sans-serif;font-style:italic;">Actisoft Technology’s approach, and offering, is one built on the basis of Work Securely, Everywhere, Everytime adopting a cloud approach to security with remote central management. This works whether you work in an office or not. Talk to us about how we can partner to ensure that your business is secure from current, new and emerging threats.</span></p></span></div></div>
</div><div data-element-id="elm_dSPgwr8LTYmER6bJOcYFug" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_dSPgwr8LTYmER6bJOcYFug"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://forms.zohopublic.eu/actisofttechnologycom/form/ContactForm1/formperma/u_Bn1cXa8Z1Yr2o504NwScyshXma21tF9OX2IUs8aqE?referrername=blog"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 13 May 2020 08:34:14 +0000</pubDate></item></channel></rss>