Ask the Expert: 7 Cybersecurity Essentials To Check Off
Along with back-to-school season, Halloween decorations hitting the shelves, and the beloved pumpkin spice latte making its reappearance, there's another often-overlooked event this fall: National Cybersecurity Awareness Month in October. With 1 in 5 small businesses experiencing a cyber-attack, it’s a good time to make sure yours is safe and secure with this checklist of the top 7 things you can do.
WHEN WAS YOUR LAST SECURITY ASSESSMENT?
It’s important to establish a baseline and close existing vulnerabilities and with cybersecurity, the job is never done. We recommend doing at least a yearly assessment in addition to ongoing monitoring.
DO YOU HAVE A SECURITY AWARENESS TRAINING PROGRAM?
95% of cybersecurity incidents occur due to human error: an errant click on the wrong email, or responding to a phishing campaign. Regular and required training programs can be one of your best defenses.
IS YOUR EMAIL SECURE?
Since most attacks originate in email its important to have tools in place that that can identify, block, notify, investigate, and respond to malicious emails, links, and attachments and prevent users from opening or clicking on harmful content. 120 emails per day on average, 94% of cyber-attacks begin with a malicious email.
DO YOU HAVE MULTIFACTOR AUTHENTICATION?
Multifactor authentication via text or email codes is an additional layer of security to ensure that even if passwords get stolen your data and network is still protected.
HAVE YOU LOOKED AT THE DARK WEB?
Utilizing a service that can scan the dark web is a proactive approach that allows you to take action on your business’s stolen credentials that are available for sale.
ARE YOU STILL RUNNING ANTI-VIRUS INSTEAD OF ENDPOINT DETECTION AND RESPONSE?
Advanced endpoint detection and response (EDR) is the latest technology that replaces outdated antivirus solutions. Typical antivirus software uses signature-based detection, while EDR offers a more proactive approach. It is able to detect and respond to threats in real time before they can cause damage. They monitor a broad range of data points including user activity, system processes, network traffic, and file activities. Make sure your business is utilizing it for better protection.
ARE ALL YOUR NETWORKED DEVICES PROTECTED?
Most people think of securing computers only but any device that’s connected to your network whether it’s a phone, printer, security camera or any other device can be a vulnerability if it doesn’t have all the updates needed to keep it secure. Some devices are set up with weak authentication, shared network access, have a lack of encryption, and limited device management or they are designed with low processing power, missing security features to lower manufacturing costs.
Gain access to the full 15 point checklist for ways to protect your business from a cyber attack as well as a FREE dark web scan by visiting us at usherwood.com/cybersecurity