Essential Security Tips for SMBs as Told by Experts: Part 5

Information on computer

Thanks to Hollywood, most people think of hackers as superheroes or nerds with magical powers, when in reality their real super power is one that you may think unlikely: psychology.

Hackers are not only good at what they do because of their knowledge on cyber science, but also because they are familiar with a user’s weak points and blind spots. For most of us, this blind spot is authority.

The Power of the Admin

Your network’s administrator account is the most trusted and powerful account. It is also the account all hackers target in order to manage a data breach, and it just so happens that human behaviour is so predictable, that most users leave their admin account conveniently labelled as “Admin.” Which gives hackers an exact target of what they should be looking for.

If a hacker would be trying to find a target to hack into the network of a business all they have to do is find the business’ domain. Once they have it, there is no need to go email by email as it is likely there will simply be an address called It’s important to note that if your Admin account is named “Admin,” then you could have a security hole in your network.

Bosses and managers should make their staff aware of what an incoming email from the Admin account looks like, so that if they ever receive a suspicious email, even if it comes from the Admin account, they would know how to recognise this cyber threat and would be able to report it immediately.

To prevent this threat, change the name of the Admin account to something random or unrelated directly to the word “Admin.”

The Value of Information

Something that a lot of businesses believe is that if their books are clean, then they shouldn’t be afraid of a data breach .

Unfortunately cybersecurity breaches occur for much more than to obtain a company’s data, they also happen to take private or corporate information of individuals to sell to clients as blackmail.

Hackers are not only interested in making obvious security breaches so they can ask for ransom. They look for anything they can monetize, even if it cannot be used or sold immediately.

In order to protect themselves against hackers, businesses must identify what Isaac Kohen, Teramind’s CEO and founder, calls the ‘crown-jewel’ data, which is the information the most valuable data that a business or company possesses.

This could be anything from employee records, customer information, bank account information, intellectual property or employee personal data. Once the ‘crown-jewel’ data is identified, there must be some investment into protecting it and restricting who has access to this information.

Simple details such as renaming an Admin account or identifying valuable information can often be overlooked and the cause for a great loss of information.

It is important to stay alert and not think of any detail as being too small or insignificant when it comes to cybersecurity, as this could make the difference between staying on the safe side and being the perfect target for a breach.

Ready to protect your business?

Talk with us today.
We help simplify cybersecurity for your business.
We'll save you time, money and stress in getting your business and data protected. All our advice is plain english and jargon free. We promise no cyber-tech speak. Contact us today.

Call us today on 1300 523 746

Website Contact Form
Scroll to Top