It’s important to present a layered defense to cyber criminals. Here’s a checklist to help you evaluate your security posture. If you’d like information about how we implement these strategies at our clients, please reach out.
Security Assessment
It’s important to establish a baseline and correct existing vulnerabilities.
Spam Email
Most attacks originate in email. Secure your email. Choose a service designed to reduce spam and y our exposure to attacks on your staff via email.
Passwords
Setup a secure password vault so that you can use a complex, unique password at every website.
Security Awareness
Train your users – often! Teach them about data security, email attacks and your policies and procedures. Use a service that sends simulated phishing attacks via email and offers additional training to the users that fall for it.
Encryption
Whenever possible, encrypt files at rest and in motion (think email). Especially mobile devices.
Advanced Endpoint Security
Protect your computers and data from malware, viruses and cyber attacks with advanced endpoint security. Today’s latest technology (which replaces your outdated anti-virus solution) protects against file-less and script based threats.
Multi-Factor Authentication
Utilize multi-factor authentication whenever you can. It adds an additional layer of protection to ensure your data remains protected even if your password is stolen.
Computer Updates
Keep Microsoft, Adobe and Java products updated for better security. The updates are generally made available because a security vulnerability was discovered.
Dark Web Research
Use a service that monitors dark web activity for your credentials. Be alerted when your credentials are stolen and shared on the dark web.
Firewall
Subscribe to and turn on Intrusion Prevention and Intrusion Detection Services. Use a service that evaluates the firewall log files.
Cyber Insurance
If all else fails, you should have protection for your income and business with cyber damage and recovery insurance policies.
Business Continuity
Test your backups regularly and create a business continuity plan document.