Your browser does not support JavaScript!

Author: Tronserve admin

Tuesday 27th July 2021 12:18 PM

How to Protect Your Business from Cyber Attacks


image cap
147 Views

How to protect your business from Cyber Attacks? Mitigating these threats takes significantly more than a single anti-virus upgrade; it needs ongoing vigilance. But protecting your systems doesn’t have to be complex. Here is how to start off.


Limit Access to Your User Data & Information


Limiting access to your valuable user data minimizes the chance for human error, which is the number-one information security threat. If a staff leaves your company, or transfers to a different company location, take protective action rather quickly, including deleting passwords and accounts from all systems and collecting company ID badges and entry keys. An ounce of access prevention can equal a pound of protection when it comes to limiting the impact of a disgruntled ex-employee.




Install Surge Protectors & Uninterruptible Power Supplies


Uninterruptible power supplies (UPS) can give you a sufficient amount of battery life and time to save your data in case there is a power disruption. Check to make sure the UPS type and size meets your standards and requirements. Every computer and networked device should be plugged into a UPS. For less-sensitive electronics and non-networked equipment, standard surge protectors should suffice. Be sure to test and replace each UPS and surge protector as recommended by the manufacturer.


Patch Your Operating Systems & Software Regularly


Nearly every new app can open up the door to a cyber attack if you don’t regularly patch and update all software on every device used by your employees. Always check for updates when purchasing a new computer or installing a new software system. Understand that software providers aren't required to provide security updates for unsupported products. For example, Microsoft® will stop supporting Windows 7 in January of 2020, so if you haven't upgraded yet, now's the time. Don’t holdup downloading operating system updates. Updates often include new or enhanced security features.




Install & Activate Software and Hardware Firewalls


Firewalls can circumvent harmful hackers and hinder employees from browsing inappropriate websites. Install and update firewall systems on every employee computer, smartphone, and networked device. Include off-site employees, whether or not you use a cloud service provider (CSP) or a virtual private network (VPN). You may also want to install an intrusion detection/prevention system (IDPS) to provide a greater level of protection.


Secure All Wireless Access Points & Networks


For secure wireless networking, use these router best practices:

- Change the new device administrative password

- Set the wireless access point so that it does not broadcast its service set identifier (SSID)

- Set your router to use WiFi Protected Access 2 (WPA-2), with the Advanced Encryption Standard (AES) for encryption

- Avoid using WEP (Wired-Equivalent Privacy).


For guest WiFi access, use a separate network from your business account.


Set up Web & Email Filters


Use email and web browser filters to limit hackers and prevent spam from clogging employee inboxes. You can also download “blacklist” services to block users from browsing risky websites that pose malware risks. Caution your employees against visiting sites that are usually involving cybersecurity threats, such as pornographic websites or social media. This might seem like a no-brainer; but it only takes one employee to visit the wrong website to inadvertently download malware.




Use Encryption for Sensitive Business Information


Use full-disk encryption to secure all your computers, tablets, and smartphones. Save a copy of your encryption password or key in a protected spot split from your stored backups. Email recipients usually need the same encryption capability in order to decrypt. Never send the password or key in the same email as the encrypted document. Give it to them via phone or some other method.


Dispose of Old Computers & Media Safely


Before donating or trashing old computers, you need to remove all important hard drive information. Get rid of any sensitive business or personal data on old CDs, flash drives, or other old media. Then eliminate these items or take them to a company that will shred them for you. Destroy sensitive paper information with a crosscut shredder or an incinerator.


Train Your Employees


Cyber-vigilant employees are your best protection against information security threats.


Every employee should know:

- What business and personal use is permitted for emails

- How to treat business information at the office or at home

- What to do if a cybersecurity incident occurs


Train each and every new employee to protect valuable data and let them sign your information policy. Use newsletters and/or ongoing training to support your culture of cybersecurity. After we've covered the key steps to protect your valuable data and information, we will show you how to install mechanisms for detecting and recognizing a cyber attack in part three of our series on “Cybersecurity for Manufacturers” from the MEP National Network.




INDUSTRY WEEK


Share this post:


This is the old design: Please remove this section after work on the functionalities for new design

Posted on : Tuesday 27th July 2021 12:18 PM

How to Protect Your Business from Cyber Attacks


none
Posted by  Tronserve admin
image cap

How to protect your business from Cyber Attacks? Mitigating these threats takes significantly more than a single anti-virus upgrade; it needs ongoing vigilance. But protecting your systems doesn’t have to be complex. Here is how to start off.


Limit Access to Your User Data & Information


Limiting access to your valuable user data minimizes the chance for human error, which is the number-one information security threat. If a staff leaves your company, or transfers to a different company location, take protective action rather quickly, including deleting passwords and accounts from all systems and collecting company ID badges and entry keys. An ounce of access prevention can equal a pound of protection when it comes to limiting the impact of a disgruntled ex-employee.




Install Surge Protectors & Uninterruptible Power Supplies


Uninterruptible power supplies (UPS) can give you a sufficient amount of battery life and time to save your data in case there is a power disruption. Check to make sure the UPS type and size meets your standards and requirements. Every computer and networked device should be plugged into a UPS. For less-sensitive electronics and non-networked equipment, standard surge protectors should suffice. Be sure to test and replace each UPS and surge protector as recommended by the manufacturer.


Patch Your Operating Systems & Software Regularly


Nearly every new app can open up the door to a cyber attack if you don’t regularly patch and update all software on every device used by your employees. Always check for updates when purchasing a new computer or installing a new software system. Understand that software providers aren't required to provide security updates for unsupported products. For example, Microsoft® will stop supporting Windows 7 in January of 2020, so if you haven't upgraded yet, now's the time. Don’t holdup downloading operating system updates. Updates often include new or enhanced security features.




Install & Activate Software and Hardware Firewalls


Firewalls can circumvent harmful hackers and hinder employees from browsing inappropriate websites. Install and update firewall systems on every employee computer, smartphone, and networked device. Include off-site employees, whether or not you use a cloud service provider (CSP) or a virtual private network (VPN). You may also want to install an intrusion detection/prevention system (IDPS) to provide a greater level of protection.


Secure All Wireless Access Points & Networks


For secure wireless networking, use these router best practices:

- Change the new device administrative password

- Set the wireless access point so that it does not broadcast its service set identifier (SSID)

- Set your router to use WiFi Protected Access 2 (WPA-2), with the Advanced Encryption Standard (AES) for encryption

- Avoid using WEP (Wired-Equivalent Privacy).


For guest WiFi access, use a separate network from your business account.


Set up Web & Email Filters


Use email and web browser filters to limit hackers and prevent spam from clogging employee inboxes. You can also download “blacklist” services to block users from browsing risky websites that pose malware risks. Caution your employees against visiting sites that are usually involving cybersecurity threats, such as pornographic websites or social media. This might seem like a no-brainer; but it only takes one employee to visit the wrong website to inadvertently download malware.




Use Encryption for Sensitive Business Information


Use full-disk encryption to secure all your computers, tablets, and smartphones. Save a copy of your encryption password or key in a protected spot split from your stored backups. Email recipients usually need the same encryption capability in order to decrypt. Never send the password or key in the same email as the encrypted document. Give it to them via phone or some other method.


Dispose of Old Computers & Media Safely


Before donating or trashing old computers, you need to remove all important hard drive information. Get rid of any sensitive business or personal data on old CDs, flash drives, or other old media. Then eliminate these items or take them to a company that will shred them for you. Destroy sensitive paper information with a crosscut shredder or an incinerator.


Train Your Employees


Cyber-vigilant employees are your best protection against information security threats.


Every employee should know:

- What business and personal use is permitted for emails

- How to treat business information at the office or at home

- What to do if a cybersecurity incident occurs


Train each and every new employee to protect valuable data and let them sign your information policy. Use newsletters and/or ongoing training to support your culture of cybersecurity. After we've covered the key steps to protect your valuable data and information, we will show you how to install mechanisms for detecting and recognizing a cyber attack in part three of our series on “Cybersecurity for Manufacturers” from the MEP National Network.




INDUSTRY WEEK

Tags:
cyber risks