Cyber Security 101 Part 4 Crooks are in for 197 days on avg before discovery….!

Imagine if you will a robber breaking in to your business or home and cleaning you out for 197 days before you discover the break in. This is what is happening every day, Cyber Thieves are able to run wild in your network for that long on average before being discovered according to a ConnectWise.com webinar I attended.

Here are 15 ways to protect your business from Cyber Attack, many are simple and easy to DIY others will require the support of IT Professionals. These 15 Ways are a great conversation starter with those that are responsible for your IT System Security.

15 Ways to Protect Your Business from Cyber Attack

  1. Do a Security Assessment
    It’s important to establish a baseline and close existing vulnerabilities. When was your last assessment?
  2. Use a Spam Blocker
    Secure your email. Most attacks originate in your email. We’ll help you choose a service designed to reduce spam and your exposure to attacks on your staff via email.
  3. Complex & Regularly Changed Passwords
    Apply security policies on your network. Examples: Deny or limit USB file storage access enable enhanced password policies, set user screen timeouts, and limit user access.
  4. User Security Awareness
    Train your users – often! Teach them about data security, email attacks, and your policies and procedures. We can provide cyber security training to your members of staff.
  5. Advanced Endpoint Detection & Response
    Us Anti-Virus & Malware Software to protect your computer’s data from malware; viruses, and cyber attacks with advanced endpoint security. Today’s latest technology (which replaces your outdated anti-virus solution} protects against file-less and script-based threats and can even rollback a ransomware attack.
  6. Two Factor Authentication
    Utilize Multi-Factor Authentication whenever you can include your: network, banking websites, and social media. This adds an additional layer of protection. So even if your password does get stolen, your data stays protected.
  7. Software Updates
    Keep Microsoft, Adobe, and Java products updated for better security. They often provide automatic updates and security patches.
  8. Folder Permissions
    Review all of your files to make sure only the authorized people have access. Create an approval process for new employees and review existing access at least once a year.
  9. SIEM/Log Management (Security Incident & Event Management)
    This Technology uses big data engines to observe events and security logs from your covered devices. Using this engine to protect against advanced threats and to meet legal & compliance requirements.
  10. Web Gateway Security
    Cyber Security – Internet security is an un-ending race. Sophisticated cloud-based security software identifies web & email threats as they emerge on the internet. Then blocks them at the network level within seconds – before they even reach the user.
  11. Mobile Device Security
    Cyber criminals often try to steal data or access your network by way of your employees’ phones and tablets. Limit access and require long complex passwords.
  12. Have a Firewall
    Install and verify your Firewalls Intrusion Detection and Intrusion Prevention features, for your network, PCs, Tablets, Mobile Devices etc.
  13. Encryption
    Whenever possible, the goal is to encrypt files at rest, in motion (think email) and especially on mobile devices. Encryption stops your data from being readable, a VPN will do this automatically.
  14. Backup
    Backup using 3 methods and 2 different technologies. For example 1. Backup to the cloud. 2. Offsite Hard Drive 3. On site Network Accessible Hard Drive. It pays to have an additional offline backup for each month of the year. Test your back ups to make sure they have all of the data you want to protect.
  15. Disaster Recovery
    Create a detailed plan to speed your business recover and get back online in a timely manner.

Buy Cyber Insurance
When your bottom line depends on your data it may be necessary to buy Cyber Crime Insurance.

On the off chance any of this applies in your Salesforce instance it might be worth a quick conversation to discuss it.

About Phil Sallaway - Manager Orange County California

Manager at SalesForceMaven in Orange County California. He is a Salesforce Consultant with a strong Marketing & Sales background.
This entry was posted in Product Manager Orange County and tagged . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s