It’s important to present a layered defense to cyber criminals. Here’s a checklist to help you evaluate your security posture. If you’d like information about how we implement these strategies at our clients, please reach out.
It’s important to establish a baseline and correct existing vulnerabilities.
Most attacks originate in email. Secure your email. Choose a service designed to reduce spam and y our exposure to attacks on your staff via email.
Setup a secure password vault so that you can use a complex, unique password at every website.
Train your users – often! Teach them about data security, email attacks and your policies and procedures. Use a service that sends simulated phishing attacks via email and offers additional training to the users that fall for it.
Whenever possible, encrypt files at rest and in motion (think email). Especially mobile devices.
Advanced Endpoint Security
Protect your computers and data from malware, viruses and cyber attacks with advanced endpoint security. Today’s latest technology (which replaces your outdated anti-virus solution) protects against file-less and script based threats.
Utilize multi-factor authentication whenever you can. It adds an additional layer of protection to ensure your data remains protected even if your password is stolen.
Keep Microsoft, Adobe and Java products updated for better security. The updates are generally made available because a security vulnerability was discovered.
Dark Web Research
Use a service that monitors dark web activity for your credentials. Be alerted when your credentials are stolen and shared on the dark web.
Subscribe to and turn on Intrusion Prevention and Intrusion Detection Services. Use a service that evaluates the firewall log files.
If all else fails, you should have protection for your income and business with cyber damage and recovery insurance policies.
Test your backups regularly and create a business continuity plan document.