MikroTik Training Center Blog

Computer Security Day 2021: A Few Tips

Can Never Have Enough!

Yesterday, Tuesday, November 30, was Computer Security Day 2021.

And what this annual day represents is that although malicious online activities are rather an omnipresent phenomena baked into the very core of the Internet, we can never stop talking about online security issues, especially the causes, consequences, and the very simple measures we can take to tackle them.

Why It Happens?

Let's go to the roots. Why do occurences such as cyber attacks, computer hacks, data breaches, etc. happen in the first place? Read below for seven of the most common causes.

1. Weak and/or Accessible Credentials

Electronic devices use different authorizations to let an individual access a device. Though reliable, they require users' diligence to work properly. Passwords & PINs must be complex and unavailable to others. Don't write your passcodes down nor store them in a file on a device.


For more advanced utilities such as face IDs and fingerprint scans, double check and ensure they work perfectly uniquely for you and you alone.

2. Software Vulnerabilities

A favorite of hackers, weakensses in applications, codes, websites, etc. make their job tremendously easy. Instead of making any kind of breach, they'll simply exploit a weakspot.


Use updated & time-tested applications from trustworthy developers. Keep all operating systems up to date. Also, if anyone is working with codes, make sure they are absolutely qualified.

3. Malware

Broadly speaking, malware are files, codes, apps, and other digital content that have been tampered to act as an entry point for hackers. They carry malicious data, attack software/hardware or simply usher a hacker into your device.


Stay clear of websites/emails with unknown origins. If your browser is up to date and warns you about accessing a website, double check. Moreover, do not use software that are poorly developed, not trusted or rarely updated.

4. Excessive Authorization

Whether it's an app or an individual, permissions must be given and organized on a needs-based approach. Too many permissions equal too many weaknesses for a hacker to exploit.


Periodically review the authorizations you have allowed and make sure they're completely necessary. Otherwise, chances are you'll forget about them over time and leave them be for a shrewd malicious individual.

5. Physical Access

Don't believe the image of hackers in a smoke-filled room with three monitors and an energy drink on their desk. You'd be surprised how many security breaches happen because an unauthorized person physically accesses a company computer.


Stay alert and pay as much attention to your surroundings as you do to your online security.

6. Inside Jobs

Whether deliberately or due to negligence, your business's network security can be compromised from the inside. It can be someone with a grudge or an untrained employee. Either way, it is a possibilty.

Relevant training sessions go a long way. Backup vital information routinely and securely. Also, a reasonable data compartmentalization and access management system should be in place. Importantly, develop healthy professional relationships and make sure you know where a potential issue lies.

7. Unsuitable and/or incomplete configurations

An integral and highly crucial part of setting up a network or device is its security configurations. Nowadays, firewalls, compartmented network designs, anti-virus software, VPN services, etc. are readily available for enhanced security.


Make sure your networks and online systems are set up and configured by an expert. Always keep your systems up to date and preferably do not use beta or developer versions of an OS if you're not a professional in that field. Invest in devices that have sufficient firewall configurations, and ask if you can have traffic encryption over your network.

Online Security and SMBs

Small and medium-sized businesses, a.k.a. SMBs, are a specific group as their needs, as well as their capital, differ greatly from large corporations when it comes to cybersecurity.

To begin with, given their limiting budgets, SMBs tend to make smaller investments for network security and may fall behind on online security improvement.


However, you would be well-advised to know that SMBs make up around half the targets of all cyber crimes for this very same reason. Hackers are aware that your security may be lax, and targeting SMBs carries a lot less risk and exposure compared to attacking large, multinational corporations or government organizations.


And most importantly, in the unfortunate case of a successful attack, SMBs suffer the greatest. Statistics have shown that more than half of SMBs find it impossible to recover from such an event:

  • They suffer financially;
  • they lose their reputation and the trust of customers; and,
  • they incur a lot of unpredicted costs to get things back in order.

Bottomline: Choose prevention over treatment!

How Can We Help?

We carry an extensive range of MikroTik network connectivity hardware, varied in size, price, performance, and usage. Thanks to these devices, we can support all types of small to medium businesses when it comes to the design and implementation of secure networks.


Below are just a touch of what we have in store:

Moreover, a high number of tailor-made solutions are available, such as customized firewall settings and centralized or site-to-site VPNs, that can ensure a multi-layered security net for your business to guarantee you do not suffer from the activities of ill-intended individuals on the Internet.


If you wish to place an order for our trustworthy MikroTik hardware, feel free to visit our online store. Alternatively, you can get in touch with our security professionals to discuss your options for long-lasting ease of mind!