As we see regularly in the news, data security breaches are complex, far-reaching and have serious, long-lasting impacts on businesses of all sizes.
Your business isn’t just responsible for safeguarding its own data; the information you hold about potential and current customers is also at risk.
Here’s how to plug the security gaps in your business.

1. Employee training
One of the weakest points in your digital armoury is the people within the organisation.
It’s easy for employees to inadvertently open back doors for cybercriminals and share data with people who have malicious intentions.
This is usually down to a simple lack of understanding about how to store and protect the data your company holds. Consistent investment in training will help your employees:
-
dispose of confidential documentation properly;
-
recognise malicious content and potential phishing emails;
-
create the strongest possible passwords; and
-
avoid accessing sensitive business information on personal devices.
2. Voice
Voice is now a key method of interacting with technology. It’s ultra convenient and with artificial intelligence and machine learning improving by the day, everything from text messages to complex web searches can be undertaken without touching a screen.
Unfortunately, devices that employ voice recognition software can potentially be used by cybercriminals to capture sensitive information.
Thankfully, such attacks aren’t expected to be widespread (they’re time consuming for criminals and device manufacturers are always quick to remove any security gaps), but there are a few steps you can take to secure such devices in your business:
-
Make sure they sit only on a secure, internal network that has firewall protection.
-
If applicable, install antivirus software on the device and turn on automatic updates.
-
Turn the device off when not in use.
-
If you can use the device to purchase items, turn that feature off or password protect it.
-
Keep devices up-to-date whenever the manufacturer releases a patch.
3. The Internet of Things (IoT)
Internet of Things devices are common targets for hackers, because they provide unique entry points into ecosystems that could potentially open backdoors into the entire business network.
However, IoT devices can only be compromised if the following strategies aren’t undertaken:
-
password protection enabled;
-
default passwords changed;
-
use of security features such as key cards on printing devices; and
-
regular security updates on every IoT device (or automatic updates turned on).
4. Artificial Intelligence (AI)
There’s no escaping the fact cybersecurity is becoming too big to tackle without some digital assistance, and AI is thankfully starting to bridge the gap.
No matter how well-trained your employees are, securing all of your devices and processes is time consuming. Thankfully, AI can be used to simulate targeted attacks and expose the vulnerabilities you probably wouldn’t find yourself.
What’s more, AI can provide the solutions required to remove any security holes it finds and learn over time about evolving threats. No human could ever hope to maintain such a tight grip on cybersecurity.
Artificial intelligence still has a way to go in this regard, but expect it to be far more prevalent as a form of defence beyond 2019.
Lastly, always remember the basics of security; use secure passwords, enable 2-factor authentication and be smart about your use of public Wi-Fi.
The information in this blog is based on a recent post by Xerox: Security Holes are Growing: How to Survive in a World of Voice, IoT, AI, and More