Cybersecurity Made Simple – 5 First Steps to becoming Compliant

Cybersecurity, a word that has become so daunting most feel it’s a subject they could never understand, let alone a process they could implement in their business or home.  While the concepts of hacking are complex, many of the most effective preventative steps are quite simple to implement.

 

  1. Enable Multifactor Authentication (sometimes referred to as 2 Factor Authentication, 2FA or MFA). This increases security tenfold and decreases the need for highly complex passwords that are hard to remember and have to be changed as soon as you actually begin to remember. Even better, it’s EASY to setup for both administrators and end users.  In the software or application, the system administrator will go into settings and click enable Multifactor Authentication (for personal services, this is you).  Then you will select the means for authentication.  Typical options include receiving a text message, phone call or entering a token code from an authentication app you download on your mobile device.  At this point I feel the last option is the most secure.
  2. Install Endpoint Protection. Implement a policy which requires endpoint protection on all devices connecting to your network. Bitdefender, Symantec, ESET and Sophos are a few good options.  These products are meant to protect your systems and data by detecting and preventing malware and ransomware attacks. Here is a link that can help you make the right choice for your organization: The Top 11 Endpoint Security Solutions For Business | Expert Insights
  3. Utilize a Virtual Private Network (VPN). Implement a policy that requires VPN to be utilized when connecting to the network. Every device (laptop, mobile, tablet, etc.) has a unique IP address. A VPN changes the IP address so hackers can’t track your activity. Additionally, a VPN uses an encrypted tunnel to protect your data from malware, sniffers, and other types of cybercrime. A VPN should always be used when making online payments, connecting over public Wi-Fi or surfing the web.  Many of the products discussed in item 2 above offer a VPN solution.
  4. Implement a Back-up Policy. Along with the installation of endpoint protection, this is the best defense against ransomware. I like anti-phishing training, I do believe it helps educate end-users, but it still only takes one click. I’ve circled back a decade or so to the old saying, “Back-up Early, Back-up Often and Validate your Back-ups.” The key is to be able to recover your data and restore your systems.  Full system back-ups and regular intervals of data back-ups are critical. It’s important to ensure the back-up devices do not remain connected to the primary source to keep the ransomware from infecting those devices as well.
  5. Secure Mobile Devices. Implement a Mobile Device Security Policy. Mobile devices have become as powerful as computers; thus it is important to ensure the device is protected in the same manner: endpoint protection is current, a VPN is utilized, the device is secured by a password or biometics and data is backed-up. Many of these objectives can be met through your provider.  For example, Verizon has an app DigitalSecure that allows for safe VPN safe browsing, wi-fi security monitoring, device security monitoring and personal ID monitoring.  AT&T has a similar app called MobileSecurity.
Shopping Cart