Which Protection Do You Use?

Yes, we mean work wise.

And what is your most used IT asset? Probably the desktop or laptop you are using 8 hours a day. Yet these systems have access to a wealth of sensitive business information and therefore your organization’s integrity. So the question is, which protection do you use? And are those systems fully covered?

We have worked with many organizations who get overwhelmed with the many steps one needs to take in order to ensure the security of office workstations. Cyber threats can come in many forms, from malware and phishing to ransomware and data breaches. Therefore, we came up with a list of some essential cybersecurity measures every office should implement to safeguard their workstations.

  1. Use Strong, Unique Passwords

You have heard this too many times, I know. But one of the most basic yet effective cybersecurity measures is the use of strong, unique passwords for all accounts and systems. Passwords should be at least 12 characters long and include a combination of letters, numbers, and special characters. Avoid using easily guessable information such as birthdays or common words. Consider implementing a password manager to help employees manage their passwords securely. Hint, Password1 is not a good password.

  1. Enable Multi-Factor Authentication (MFA)

Multi-factor authentication adds an extra layer of security by requiring users to provide two or more verification factors to access a system. This could include something they know (password), something they have (a mobile device), and something they are (fingerprint). Enabling MFA significantly reduces the risk of unauthorized access. We cannot stress this enough. If you don’t have MFA yet, you are vulnerable. Shing uses Duo and Microsoft, but there are many MFAs out there.

  1. Keep Software and Systems Updated

Regularly updating software and systems is crucial in protecting against known vulnerabilities. Cyber attackers often exploit outdated software to gain access to systems. Ensure that all operating systems, applications, and security software are set to update automatically. It’s also important to regularly review and update security policies to adapt to new threats. For clients who want support with this, Shing can automate the patching cycle, ensuring consistent and regular updates for ever changing potential vulnerabilities.

  1. Install and Maintain Antivirus and Anti-Malware Software

Antivirus and anti-malware software help detect and remove malicious software from workstations. Ensure that this software is installed on all office workstations and is kept up-to-date. Regular scans should be scheduled to detect and mitigate potential threats early. Remember when we though McAfee was enough? Well, it may not be. Not all antivirus and anti-malware software is the same. Research, speed to deployment and updates is the key. Shing uses ESET and we would be happy to compare multiple systems for your evaluation.

  1. Install and Email Protection

Email protection refers to the various strategies and technologies used to secure email communications from unauthorized access, data breaches, phishing attacks, and other cyber threats. These protective measures include encryption, spam filtering, malware detection, and multi-factor authentication, among others. By implementing email protection, organizations and individuals can safeguard sensitive information, maintain privacy, and ensure that their communications remain confidential and intact. Email protection is crucial for preventing unauthorized parties from intercepting and exploiting email data, which can lead to significant financial and reputational damages. Shing uses Proofpoint for ourselves and our clients.

  1. Employ Firewalls

Firewalls act as a barrier between your internal network and external threats. They monitor incoming and outgoing traffic to block potentially harmful data. Ensure that both hardware and software firewalls are installed and properly configured on all workstations.

  1. Secure Remote Access

In today’s digital era, secure remote access has become a critical component for businesses and individuals alike. The ability to access data and applications from remote locations enhances productivity and flexibility, enabling employees to work from anywhere at any time. However, this convenience comes with significant security risks, making the use of Virtual Private Networks (VPN) and Virtual Desktop Infrastructure (VDI) essential.

  1. VPNs provide a secure connection between the user’s device and the company network by encrypting data and masking the user’s IP address, thereby protecting sensitive information from cyber threats.
  2. VDIs, on the other hand, host desktop environments on a centralized server, allowing users to access their work environment securely from any device. This centralized approach simplifies management and enhances security by keeping data within the secure confines of the corporate network. Together, VPNs and VDIs ensure that remote access is not only convenient but also secure, safeguarding against unauthorized access and data breaches, and thereby maintaining the integrity and confidentiality of critical business information.
  1. Conduct Regular Backups

Regular backups are essential to protect data against loss from cyber-attacks, hardware failures, or natural disasters. Ensure that data is backed up to a secure, offsite location. Automate the backup process to ensure consistency and verify backups regularly to ensure data integrity. This includes email backups. If you have Microsoft, don’t presume your emails and SharePoint is backed up in case of a vulnerability!

  1. Provide Cybersecurity Training

Employees are often the first line of defense against cyber threats. Regular cybersecurity training can help them recognize and respond to threats such as phishing emails, suspicious links, and social engineering attacks. Make sure the training is updated regularly to cover the latest threats and best practices. Shing has multiple options for very engaged and gamified training to more traditional watch and learn system. Either way, we can align with your learning culture.

  1. Implement Access Controls

Limit access to sensitive information based on roles and responsibilities. Implement the principle of least privilege, ensuring that employees only have access to the data and systems necessary for their job functions. Use access controls such as user accounts, permissions, and encryption to protect sensitive data.

  1. Secure Physical Workstations

Physical security is just as important as digital security. Ensure that workstations are locked when not in use and that access to office premises is controlled. Use cable locks for laptops and secure areas where sensitive information is stored.

  1. Monitor and Audit Systems Regularly

Regular monitoring and auditing of systems can help detect unusual activities and potential security incidents. Implement logging and monitoring tools to track access and changes to systems and data. Regular audits can help identify and address security gaps.

If you are thinking, this is a lot…you are correct. However, all these steps are key in today’s environment. And if a vulnerability occurs, all these steps will be reviewed to identify what could have been done to prevent the incident. By implementing these essential cybersecurity measures, offices can significantly reduce the risk of cyber threats and protect their workstations from unauthorized access and data breaches. Here is the Shing Digital Plug….if you do not have the time or resources to look after this for your environment, we can help. We will work with your individual requirements, budget and timeline. And we will keep you secure.

Fun Facts

with

Shing

88 percent of cybersecurity breaches are caused by human error.

Fun Facts

with

Shing

97 percent of organizations have seen an increase in cyber threats since the start of the Russia-Ukraine war in 2022.

Fun Facts

with

Shing

Using a single password, hackers infiltrated the Colonial Pipeline Company in 2021 with a ransomware attack that caused fuel shortages across the US.

Fun Facts

with

Shing

A 2021 LinkedIn data breach exposed the personal information of 700 million users or about 93 percent of all LinkedIn members.

Fun Facts

with

Shing

Over 560 million Ticketmaster customers had their information stolen in a 2024 breach.

Fun Facts

with

Shing

In 2023, security breaches saw a 72 percent increase from 2021, which held the previous all-time record.

Fun Facts

with

Shing

The average lifecycle of a breach is 292 days from identification to containment.

Fun Facts

with

Shing

The average time to identify a breach is 194 days.

Fun Facts

with

Shing

The average cost of a data breach was $4.88 million in 2024, the highest average on record.

Fun Facts

with

Shing

Average annual income for a Canadian Cyber Criminal top hacker is $10M per year.
Cyber Criminal Revenue in 2024 is estimated to have hit 9.2 Trillion USD worldwide.

Fun Facts

with

Shing

Criminal Gangs have started Cybersecurity Penetration Schools. Teaching penetration testing...then they convert them to the dark side.

Fun Facts

with

Shing

Crocodiles in Indonesia have learned to “wave” in water, simulating human child drowning. When a person goes to investigate, they become Croc Lunch.

Fun Facts

with

Shing

Grasshoppers, crickets, and locusts: Contain the highest protein content per unit of mass, around 61% on a dry basis

Fun Facts

with

Shing

Llama milk contains more protein than cow and goat milk. Sheep milk, however, has the highest protein.

Fun Facts

with

Shing

North America has a National UFO Reporting Center based out of WA, US.

Fun Facts

with

Shing

The very first Flat Earth International Conference was held in Edmonton, Alberta.

Fun Facts

with

Shing

Southern Alberta is tied with Southern Saskatchewan as the sunniest place in Canada, with over 2,375 hours of bright sunshine a year.

Fun Facts

with

Shing

The Guinness Book of World Records lists Commonwealth Bay, Antarctica as the windiest place on the planet. Katabatic winds are recorded at over 150 mph on a regular basis

Fun Facts

with

Shing

Lethbridge is the 2nd windiest City in Canada. The winner is Saint Johns, NFL. Calgary is the biggest large Wind City.

Fun Facts

with

Shing

90% of all Canadians live within 160 km of the US border.

Fun Facts

with

Shing

Canada is the home to 10% of the world’s forests.

Fun Facts

with

Shing

Canada has more lakes than the rest of the world combined.

Fun Facts

with

Shing

Alberta has the highest concentration of US Citizens living in Canada.

Fun Facts

with

Shing

33% of Calgarians are foreign-born.

Fun Facts

with

Shing

Calgary has the 2nd highest concentration of head offices across Canada. The first one is Toronto.

Fun Facts

with

Shing

Calgary has the highest GDP of any other city in Canada. (stats as of 2022)

Fun Facts

with

Shing

The majority of Canadian hockey players shoot left. Whereas the majority of US hockey players shoot right.

Fun Facts

with

Shing

Canada’s most played sport? GOLF! Followed by Hockey.

Fun Facts

with

Shing

Canada has the most left-handed golfers in the world (due to hockey).

Fun Facts

with

Shing

We call our Canadian Geese a different name - Cobra Chickens!

Fun Facts

with

Shing

Gravitational time dilation is a scientific theory that Gravity is produced due to time difference based on height.

Fun Facts

with

Shing

The Edmonton Oilers have won the Stanley Cup 5 times, last one being 1990.

Fun Facts

with

Shing

Heinz scientists have figured out that the optimal flow of ketchup is roughly 0.045 km per hour.

Fun Facts

with

Shing

Canada has a National Maple Syrup Reserve.

Fun Facts

with

Shing

Canada has a National Butter Reserve.

Fun Facts

with

Shing

Tim Berners-Lee invented the World Wide Web in 1990.

Fun Facts

with

Shing

A large part of northern Canada has lower gravity than the rest of the planet.

Fun Facts

with

Shing

There’s one bear for every two people in the Yukon.

Fun Facts

with

Shing

The first thanksgiving was celebrated in Newfoundland on May 27, 1578. The meal consisted of salted beef, biscuits, and peas.

Fun Facts

with

Shing

The coldest temperature ever recorded in North America was -63c in Snag, a small village in the Yukon.

Fun Facts

with

Shing

A Canadian robot named Dextre does repairs to the international space station.

Fun Facts

with

Shing

It’s legal to have a kangaroo as a pet in Alberta.

Fun Facts

with

Shing

Saskatchewan is the world’s largest exporter of mustard. The US eats most of it.

Fun Facts

with

Shing

At the end of WW2 Canada had the third largest navy in the world and 4th largest air force.

Fun Facts

with

Shing

Yonge Street is the longest street in the world and touches the Great Lakes and Cooks Bay.

Fun Facts

with

Shing

Mount Logan is the highest mountain in Canada.

Fun Facts

with

Shing

Sweden has the most islands in the world – over 220,000!

Fun Facts

with

Shing

The whopee cushion was invented in Canada.

Fun Facts

with

Shing

Little Lake Manitou, Saskatchewan is 5 times saltier than the ocean.

Fun Facts

with

Shing

The oldest known rock, discovered in Hudson Bay, is 4 billion years old.

Fun Facts

with

Shing

Canada has more doughnut shops per person than any other country.

Fun Facts

with

Shing

Alberta is the hail capital of the world.

Fun Facts

with

Shing

It would take 33 years to walk the coastline.

Fun Facts

with

Shing

Until 1995, it was illegal for margarine to be yellow.

Fun Facts

with

Shing

Quebec produces more than 70% of the world’s supply of maple syrup.

Fun Facts

with

Shing

Winnipeg consumes the most slurpees in the world.

under maintenance

The CLIENT PORTAL is currently undergoing maintenance.

For service, please email service@shingdigital.com or call 1-866-238-4941.