2
9 Ways to Protect Your Business from Cyber Criminals Get Educated Understand what data you store and what vulnerabilities you have. Provide ongoing security aware- ness training and information to your employees and phish-test them regularly. Secure Your Bank Accounts If it is offered, configure Multi-Factor Authentication (MFA), also known as Two-factor Authentication (2FA), on your accounts. If it is not offered, consider switching banks. Setup controls and limits on ACH and wire-transfers. If it is offered, consider signing up for paper check positive pay. Level-up Your Cyber Insurance If you haven’t reviewed your cyber security insurance coverages and limits within the past year, call your insurance broker and make sure the coverages you have are adequate for the risks you have in your business. If your broker isn’t familiar with cyber risks, find one who is. Reduce Your Online Exposure Do not publish any company email addresses on the Internet, especially on LinkedIn. That just invites more phishing email into your company, which increases your risks. Tip: Google employee email addresses, surrounded by quotations ( for example: “myemail@domain .com” ) to see where it might be listed, and have it removed, if possible. Use Good Password Practices Use different passwords for every different website and online service you access and change them periodically. Use Multi-Factor Authentication (MFA), also known as Two-factor Authentication (2FA), wherever possible. Use 12 digit or longer passphrases or auto-generat- ed passwords. Use a password manager like Lastpass with MFA enabled. Backup and Secure Your Data Ensure that you have at least daily backups of your data, and that those backups are not accessible from any workstation that could be compro- mised. Occasionally test your backups by restoring some test information. If you carry data on a laptop or mobile device, ensure that it is encrypted. Keep Software Updated Most of today’s malware takes advantage of known vulnerabilities in both the operating system and applications. Keep Windows, Mac OS and all those apps you have up to date. It’s just that simple! Use Endpoint Protection Use a next-generation endpoint protection suite that provides prevention, detection, remediation and forensics. It should feature behavior-based threat detection, not just signature-based detection. Ensure that all endpoints have protection and report into a central console that alerts when an issue is detected. Harden Your Perimeter and Monitor Your Interior Protect your network with current generation firewalls that properly control traffic into and out of your network. Inside your network, monitor and log traffic for suspicious activity. Monitor and collect logs on mobile endpoints no matter where they operate. Business Owner Some IT Experience Geek is the new Chic 9850 Redhill Drive. Cincinnati, OH 45242 • 513.469.6500 • www.intrust-it.com G e e k o m e t e r ( h o w g e e kta stic a r e y o u ? )

Ways to Protect Your Business from Cyber Criminals...insurance broker and make sure the coverages you have are adequate for the risks you have in your business. If your broker isn’t

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Ways to Protect Your Business from Cyber Criminals...insurance broker and make sure the coverages you have are adequate for the risks you have in your business. If your broker isn’t

9 Ways to Protect Your Business from Cyber Criminals

Get Educated

Understand what data you store and what vulnerabilities you have. Provide ongoing security aware-ness training and information to your employees and phish-test them regularly.

Secure Your Bank Accounts

If it is o�ered, con�gure Multi-Factor Authentication (MFA), also known as Two-factor Authentication (2FA), on your accounts. If it is not o�ered, consider switching banks. Setup controls and limits on ACH and wire-transfers. If it is o�ered, consider signing up for paper check positive pay.

Level-up Your Cyber Insurance

If you haven’t reviewed your cyber security insurance coverages and limits within the past year, call your insurance broker and make sure the coverages you have are adequate for the risks you have in your business.

If your broker isn’t familiar with cyber risks, �nd one who is.

Reduce Your Online Exposure

Do not publish any company email addresses on the Internet, especially on LinkedIn. That just invites more phishing email into your company, which increases your risks.

Tip: Google employee email addresses, surrounded by quotations ( for example: “myemail@domain .com” ) to see where it might be listed, and have it removed, if possible.

Use Good Password Practices

Use di�erent passwords for every di�erent website and online service you access and change them periodically. Use Multi-Factor Authentication (MFA), also known as Two-factor Authentication (2FA), wherever possible. Use 12 digit or longer passphrases or auto-generat-ed passwords. Use a password manager like Lastpass with MFA enabled.

Backup and Secure Your Data

Ensure that you have at least daily backups of your data, and that those backups are not accessible from any workstation that could be compro-mised. Occasionally test your backups by restoring some test information.

If you carry data on a laptop or mobile device, ensure that it is encrypted.

Keep Software Updated

Most of today’s malware takes advantage of known vulnerabilities in both the operating system and applications. Keep Windows, Mac OS and all those apps you have up to date. It’s just that simple!

Use Endpoint Protection

Use a next-generation endpoint protection suite that provides prevention, detection, remediation and forensics. It should feature behavior-based threat detection, not just signature-based detection. Ensure that all endpoints have protection and report into a central console that alerts when an issue is detected.

Harden Your Perimeter and Monitor Your Interior

Protect your network with current generation �rewalls that properly control tra�c into and out of your network. Inside your network, monitor and log tra�c for suspicious activity. Monitor and collect logs on mobile endpoints no matter where they operate.

Busi

ness

Ow

ner

Som

e IT

Exp

erie

nce

Gee

k is

the

new

Chi

c

9850 Redhill Drive. Cincinnati, OH 45242 • 513.469.6500 • www.intrust-it.com

Geekom

eter

(how geekta

stic

are y

ou?)

Page 2: Ways to Protect Your Business from Cyber Criminals...insurance broker and make sure the coverages you have are adequate for the risks you have in your business. If your broker isn’t

Resources

9850 Redhill Drive. Cincinnati, OH 45242 • 513.469.6500 • www.intrust-it.com

1. Get Educated: • https://intrust-it.com/cyber-security-score/ • https://www.knowbe4.com/automated-security-awareness-program • http://clark.com/ • https://krebsonsecurity.com/

2. Secure your bank accounts: • https://www.huntington.com/Commercial/payables-management/fraud-mitigation

3. Level-up your cyber insurance: • https://en.wikipedia.org/wiki/Cyber-Insurance

4. Reduce your online exposure: • https://www.knowbe4.com/email-exposure-check/ • https://haveibeenpwned.com/ • http://www.idagent.com/dark-web/

5. Use good password practices: • https://www.lastpass.com/business • https://twofactorauth.org/ • https://www.troyhunt.com/passwords-evolved-authentication-guidance-for-the-modern-era/

6. Backup and secure: • https://www.howtogeek.com/192894/how-to-set-up-bitlocker-encryption-on-windows/ • https://www.macworld.com/article/2880039/how-to-encrypt-your-mac-with-�levault-2-and-why-you-absolutely-should.html

7. Keep software updated: • https://www.kcsoftwares.com/?sumo

8. Use endpoint protection: • https://www.sentinelone.com/ • https://www.opendns.com/ • https://www.knowbe4.com/ransomware-simulator

9. Harden your perimeter: • https://freescan.qualys.com

Additional information: • http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ • http://www.csoonline.com/article/2866911/cyber-attacks-espionage/why-criminals-pick-on-small-business.html • https://www.av-test.org/en/ • https://www.torproject.org/ • https://en.wikipedia.org/wiki/Silk_Road_(marketplace) • https://bitcoin.org/ • Deep Web the Movie http://www.deepwebthemovie.com/ • Documentary: The Rise and Rise of Bitcoin http://bitcoindoc.com/ • Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It by Marc Goodman • Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door by Brian Krebs • Personal Digital Security: Protecting Yourself from Online Crime by Michael Bazzell • American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road by Nick Bilton and Will Damron