Author: Tronserve admin
Tuesday 27th July 2021 12:18 PM
How to Protect Your Business from Cyber Attacks
How to protect your business from Cyber Attacks? Mitigating these threats takes significantly more than a single anti-virus upgrade; it needs ongoing vigilance. But protecting your systems doesn’t have to be complex. Here is how to start off.
Limit Access to Your User Data & Information
Limiting access to your valuable user data minimizes the chance for human error, which is the number-one information security threat. If a staff leaves your company, or transfers to a different company location, take protective action rather quickly, including deleting passwords and accounts from all systems and collecting company ID badges and entry keys. An ounce of access prevention can equal a pound of protection when it comes to limiting the impact of a disgruntled ex-employee.
Install Surge Protectors & Uninterruptible Power Supplies
Uninterruptible power supplies (UPS) can give you a sufficient amount of battery life and time to save your data in case there is a power disruption. Check to make sure the UPS type and size meets your standards and requirements. Every computer and networked device should be plugged into a UPS. For less-sensitive electronics and non-networked equipment, standard surge protectors should suffice. Be sure to test and replace each UPS and surge protector as recommended by the manufacturer.
Patch Your Operating Systems & Software Regularly
Nearly every new app can open up the door to a cyber attack if you don’t regularly patch and update all software on every device used by your employees. Always check for updates when purchasing a new computer or installing a new software system. Understand that software providers aren't required to provide security updates for unsupported products. For example, Microsoft® will stop supporting Windows 7 in January of 2020, so if you haven't upgraded yet, now's the time. Don’t holdup downloading operating system updates. Updates often include new or enhanced security features.
Install & Activate Software and Hardware Firewalls
Firewalls can circumvent harmful hackers and hinder employees from browsing inappropriate websites. Install and update firewall systems on every employee computer, smartphone, and networked device. Include off-site employees, whether or not you use a cloud service provider (CSP) or a virtual private network (VPN). You may also want to install an intrusion detection/prevention system (IDPS) to provide a greater level of protection.
Secure All Wireless Access Points & Networks
For secure wireless networking, use these router best practices:
- Change the new device administrative password
- Set the wireless access point so that it does not broadcast its service set identifier (SSID)
- Set your router to use WiFi Protected Access 2 (WPA-2), with the Advanced Encryption Standard (AES) for encryption
- Avoid using WEP (Wired-Equivalent Privacy).
For guest WiFi access, use a separate network from your business account.
Set up Web & Email Filters
Use email and web browser filters to limit hackers and prevent spam from clogging employee inboxes. You can also download “blacklist” services to block users from browsing risky websites that pose malware risks. Caution your employees against visiting sites that are usually involving cybersecurity threats, such as pornographic websites or social media. This might seem like a no-brainer; but it only takes one employee to visit the wrong website to inadvertently download malware.
Use Encryption for Sensitive Business Information
Use full-disk encryption to secure all your computers, tablets, and smartphones. Save a copy of your encryption password or key in a protected spot split from your stored backups. Email recipients usually need the same encryption capability in order to decrypt. Never send the password or key in the same email as the encrypted document. Give it to them via phone or some other method.
Dispose of Old Computers & Media Safely
Before donating or trashing old computers, you need to remove all important hard drive information. Get rid of any sensitive business or personal data on old CDs, flash drives, or other old media. Then eliminate these items or take them to a company that will shred them for you. Destroy sensitive paper information with a crosscut shredder or an incinerator.
Train Your Employees
Cyber-vigilant employees are your best protection against information security threats.
Every employee should know:
- What business and personal use is permitted for emails
- How to treat business information at the office or at home
- What to do if a cybersecurity incident occurs
Train each and every new employee to protect valuable data and let them sign your information policy. Use newsletters and/or ongoing training to support your culture of cybersecurity. After we've covered the key steps to protect your valuable data and information, we will show you how to install mechanisms for detecting and recognizing a cyber attack in part three of our series on “Cybersecurity for Manufacturers” from the MEP National Network.