One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 740331
Date de publication 2018-06-25 13:00:00 (vue: 2018-07-11 17:02:48)
Titre Safety Measures for Protecting Your Business from Cyber Attacks
Texte All sizes of businesses are now targets for cyber criminals. Per the Verizon 2018 DBIR, 58% of data breach victims are small businesses. Furthermore, it is shocking to see that 60% of small businesses are shut down within 6 months of an attack, according to the National Cyber Security Alliance. So, what makes these small enterprises prone to cyber-attacks? Probably it is the lack of resources due to limited budget and the misbelief that only large organizations are attacked by hackers. However, all size businesses need to stay ahead of cyber attackers. I have come up with some useful preventive measures to protect your business from cyber-attacks. Take a look: Train Your Staff Your employees are your biggest asset, but at the same time, they are the biggest security risk as well. So, your primary action should be to give security awareness education to your staff. This will help in minimizing cases of accidental or intentional data leakage. One important point to keep in mind is that providing training to your staff is not a one-time task. Rather, it should be done periodically to ensure that your employees are kept up to date with the latest cyber threats. It helps them act cautiously against security vulnerabilities and threats. Manage your Passwords Your passwords are the key to your company’s confidential information. It is crucial to follow some basic thumb rules when creating and managing passwords for your company. Always change default passwords to unique passwords Do not use the same password for different accounts Make sure you store your passwords safely. Use a password manager. Never write your passwords on paper accessible to others. Follow the guidelines for making a strong password. Use a combination of uppercase and lowercase letters, numbers, symbols, etc.  Keep your tech in good shape The OS and apps on company systems should be up-to-date, as that ensures installation of latest security patches. Further, firewall and antivirus need to be installed on each and every system. Ensure that both are active, up-to-date and installed with the right settings. Microsoft operating systems come with a default firewall, so you just need to activate it. However, it is strongly recommended to invest in a reliable and advanced antivirus software for PCs. After all, buying an antivirus is much cheaper than becoming a cyber-attack victim. Keep backups to limit the loss With the rising number of ransomware attacks, the importance of having data backup has come into the picture. It is better to keep a copy of your data rather than taking the risk of paying ransom to hackers. A company can get back running normally after an attack if data backup is available. Make sure you run periodic backups of your company’s data as it helps in restoring from a recent point. Backups should always be kept on a separate system. Get your Coding tested Your website code and hosting is an important aspect for the security of your company. Get your website fully tested for security errors by your internal Information Security team or hire one. Improper or outdated code can help hackers make way into your website and ultimately cause harm. Further, make sure the hosting facility for your website is from a reliable hosting company. Don’t forget to
Envoyé Oui
Condensat  keep 2018 2021 able about above accessible accidental according accounts act action activate active add addresses advanced after against ahead all alliance already always antivirus any application apps are around aspect asset assurance attack attacked attackers attacks audit auditor authentication authorities available awareness back backup backups bank banking based basic becomes becoming been behind being below: better biggest block both breach breached breaches breadth budget business businesses but buy buying can card cases cause cautiously certain certainly certificate change changes cheaper code codes coding combination come comes company company’s comprehensive compromised confidential consider consume content control convey copy cost creating credentials credit/debit crime criminals crucial customers cyber data date dbir default depth device different doing don’t done down due each education email employees endpoint endpoints ensure ensures enterprises entirely eps errors etc even events every execute extra facility factor figure finding firewall first follow forget form from front fully further furthermore generated generic get getting give gives good guidelines hackers handling harm has have having help helps highly hire hosting however immediately importance important improper improving incidents includes inform information informed infosec insights installation installed instance intentional internal invest investment issuing just keep kept key know lack large last latest launch layer leakage least letters level like limit limited little login look: loss lost lowercase make makes making malicious malware manage manager managing measures medium mentioned microsoft might mind minimizing misbelief mitigate months more most much names national natural necessary need never new normally not now now targets number numbers occurred occurrence one ones online only operating order organizations other others out outdated panic panicky paper password passwords patches paying pcs per periodic periodically picture place planning point post practices predicted preventive price primary probably procedures process prone protect protecting protection provided provides providing ransom ransomware rather reason reasonable recent recommendation recommendations recommended release reliable repeat require resources response restoring right rising risk root rules run running safeguards safely safety same security see sensitive separate settings shape shocking should shut size sizes small software solution solutions some soon spent staff stay steps stolen store street stressful strong strongly such sure symbols system systems take takes taking task team tech tell tested than them then these thief things threats thumb thus time train training transaction trillion two type ultimately unauthorized unique until uppercase use used useful value verizon victim victims vulnerabilities way weak web website well what when which will within world would write your
Tags Ransomware Data Breach
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: