12 Steps: Cybersecurity Checklist

12 Steps: Cybersecurity Checklist

iti


It’s important to present a layered defense to cyber criminals. Here’s a checklist to help you evaluate your security posture. If you’d like information about how we implement these strategies at our clients, please reach out.


Security Assessment

It’s important to establish a baseline and correct existing vulnerabilities.

Spam Email

Most attacks originate in email. Secure your email. Choose a service designed to reduce spam and y our exposure to attacks on your staff via email.

Passwords

Setup a secure password vault so that you can use a complex, unique password at every website.

Security Awareness

Train your users – often! Teach them about data security, email attacks and your policies and procedures. Use a service that sends simulated phishing attacks via email and offers additional training to the users that fall for it.

Encryption

Whenever possible, encrypt files at rest and in motion (think email). Especially mobile devices.

Advanced Endpoint Security

Protect your computers and data from malware, viruses and cyber attacks with advanced endpoint security. Today’s latest technology (which replaces your outdated anti-virus solution) protects against file-less and script based threats.

Multi-Factor Authentication

Utilize multi-factor authentication whenever you can. It adds an additional layer of protection to ensure your data remains protected even if your password is stolen.

Computer Updates

Keep Microsoft, Adobe and Java products updated for better security. The updates are generally made available because a security vulnerability was discovered.

Dark Web Research

Use a service that monitors dark web activity for your credentials. Be alerted when your credentials are stolen and shared on the dark web.

Firewall

Subscribe to and turn on Intrusion Prevention and Intrusion Detection Services. Use a service that evaluates the firewall log files.

Cyber Insurance

If all else fails, you should have protection for your income and business with cyber damage and recovery insurance policies.

Business Continuity

Test your backups regularly and create a business continuity plan document.

 

Share the Post

About the Author

Related Posts

Service Expert

Jeremy Nolder

Jeremy Bio

 

Want More Information?