Do your cyber spring clean

Share on Social

As we enter a new season, it’s time for spring cleaning. Decluttering can be applied to all aspects of your life, so when you are tidying up your workspace have a think about tech too.

The spring-cleaning sensation spread across the world last year as Netflix star Marie Kondo captured the attention of viewers all over the world with her “KonMari” method.

The method is “about choosing joy” and can be applied to pretty much anything – including cyber security. Devoting some time to tidying up your devices will go a long way and could help your business to enhance  your security and peace of mind online.

We look over some of the basic rules attached to the KonMari method below.

Commit to tidying up

The main rule attached to the KonMari method is commitment. Marie Kondo believes that those using the method should get rid of the things that are no longer of use to them, keeping only the things that “spark joy”.

This is something we are all guilty of when it comes to tech. Most of us will keep an app even if we do not use it often. Outdated apps and permissions could leave your device susceptible to a cyber attack, so it is important that you get rid of any that you no longer need or use.

Another thing to consider is updating devices. Make sure your apps and software are kept updated. This includes your smartphones, tablets, laptops, desktop PCs and all the apps on them. This will help your organisation to prevent known vulnerabilities from being exploited.

 

Imagine your ideal strategy

Now is a good time to set aside some time to evaluate your cyber security strategy.

KonMari’s blue sky thinking approach can easily be applied to cyber security and this step will motivate you to think more about what your organisation needs rather than just what it wants. We recommend working from a checklist.

Cyber Essentials Online has already created a cyber security checklist which can protect your business from up to 80% of cyber attacks. You can find it here.

 

Think category

The KonMari method works by category. Once you have read through the Cyber Essentials checklist, you may realise that only certain areas need to be updated.

We recommend that you work through the checklist category by category. For example, you may already be using a firewall to secure your internet connection, but is your organisation choosing the most secure settings possible for devices and software?

 

Is your cyber security strategy sparking joy?

It is important that you are happy with your cyber security strategy. Last year, more businesses – 39% – were negatively impacted in terms of the day-to-day running of their organisation due to cyber breaches. These required new protection measures to be undertaken, staff time and resource to be diverted or caused other widespread business disruption.

Make sure your business is protected. Find out more about how your organisation can be protected from basic cyber security attacks with Cyber Essentials. With access to the online self-assessment questionnaire, a valid certification for 12 months, plus 24-hour helpdesk support, achieve complete Cyber Essentials compliance today.

Take the Cyber Essentials Ready Checklist today and find out if you’re ready to certify.