Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
9 Ways to Protect Your Business from Cyber Criminals
Get Educated
Understand what data you store and what vulnerabilities you have. Provide ongoing security aware-ness training and information to your employees and phish-test them regularly.
Secure Your Bank Accounts
If it is o�ered, con�gure Multi-Factor Authentication (MFA), also known as Two-factor Authentication (2FA), on your accounts. If it is not o�ered, consider switching banks. Setup controls and limits on ACH and wire-transfers. If it is o�ered, consider signing up for paper check positive pay.
Level-up Your Cyber Insurance
If you haven’t reviewed your cyber security insurance coverages and limits within the past year, call your insurance broker and make sure the coverages you have are adequate for the risks you have in your business.
If your broker isn’t familiar with cyber risks, �nd one who is.
Reduce Your Online Exposure
Do not publish any company email addresses on the Internet, especially on LinkedIn. That just invites more phishing email into your company, which increases your risks.
Tip: Google employee email addresses, surrounded by quotations ( for example: “myemail@domain .com” ) to see where it might be listed, and have it removed, if possible.
Use Good Password Practices
Use di�erent passwords for every di�erent website and online service you access and change them periodically. Use Multi-Factor Authentication (MFA), also known as Two-factor Authentication (2FA), wherever possible. Use 12 digit or longer passphrases or auto-generat-ed passwords. Use a password manager like Lastpass with MFA enabled.
Backup and Secure Your Data
Ensure that you have at least daily backups of your data, and that those backups are not accessible from any workstation that could be compro-mised. Occasionally test your backups by restoring some test information.
If you carry data on a laptop or mobile device, ensure that it is encrypted.
Keep Software Updated
Most of today’s malware takes advantage of known vulnerabilities in both the operating system and applications. Keep Windows, Mac OS and all those apps you have up to date. It’s just that simple!
Use Endpoint Protection
Use a next-generation endpoint protection suite that provides prevention, detection, remediation and forensics. It should feature behavior-based threat detection, not just signature-based detection. Ensure that all endpoints have protection and report into a central console that alerts when an issue is detected.
Harden Your Perimeter and Monitor Your Interior
Protect your network with current generation �rewalls that properly control tra�c into and out of your network. Inside your network, monitor and log tra�c for suspicious activity. Monitor and collect logs on mobile endpoints no matter where they operate.
Busi
ness
Ow
ner
Som
e IT
Exp
erie
nce
Gee
k is
the
new
Chi
c
9850 Redhill Drive. Cincinnati, OH 45242 • 513.469.6500 • www.intrust-it.com
Geekom
eter
(how geekta
stic
are y
ou?)
Resources
9850 Redhill Drive. Cincinnati, OH 45242 • 513.469.6500 • www.intrust-it.com
1. Get Educated: • https://intrust-it.com/cyber-security-score/ • https://www.knowbe4.com/automated-security-awareness-program • http://clark.com/ • https://krebsonsecurity.com/
2. Secure your bank accounts: • https://www.huntington.com/Commercial/payables-management/fraud-mitigation
3. Level-up your cyber insurance: • https://en.wikipedia.org/wiki/Cyber-Insurance
4. Reduce your online exposure: • https://www.knowbe4.com/email-exposure-check/ • https://haveibeenpwned.com/ • http://www.idagent.com/dark-web/
5. Use good password practices: • https://www.lastpass.com/business • https://twofactorauth.org/ • https://www.troyhunt.com/passwords-evolved-authentication-guidance-for-the-modern-era/
6. Backup and secure: • https://www.howtogeek.com/192894/how-to-set-up-bitlocker-encryption-on-windows/ • https://www.macworld.com/article/2880039/how-to-encrypt-your-mac-with-�levault-2-and-why-you-absolutely-should.html
7. Keep software updated: • https://www.kcsoftwares.com/?sumo
8. Use endpoint protection: • https://www.sentinelone.com/ • https://www.opendns.com/ • https://www.knowbe4.com/ransomware-simulator
9. Harden your perimeter: • https://freescan.qualys.com
Additional information: • http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ • http://www.csoonline.com/article/2866911/cyber-attacks-espionage/why-criminals-pick-on-small-business.html • https://www.av-test.org/en/ • https://www.torproject.org/ • https://en.wikipedia.org/wiki/Silk_Road_(marketplace) • https://bitcoin.org/ • Deep Web the Movie http://www.deepwebthemovie.com/ • Documentary: The Rise and Rise of Bitcoin http://bitcoindoc.com/ • Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It by Marc Goodman • Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door by Brian Krebs • Personal Digital Security: Protecting Yourself from Online Crime by Michael Bazzell • American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road by Nick Bilton and Will Damron