In light of some of the recent high-profile attacks; We wanted to share some basic cybersecurity tips for businesses of all sizes and provide a simple checklist so that you can audit your company’s cybersecurity strategy.
This is all standard practice for seasoned security experts, but as we have seen, even the biggest companies in the world can overlook the basics and get caught out.
Table of contents
Sharing Passwords – What’s your strategy?
Pinning Passwords to Slack is not a good idea (See – Twitter). Sending it in an email or even in a private message is no better. Nothing beats old-fashioned verbalization or writing with a pen and paper (that is destroyed afterward). In today’s world, we can also use a password manager.
As hard as we try, most passwords are pretty easy to crack, which is why Password Managers are great for automating different complex passwords on each site you use.
Password Managers aren’t perfect, but using one is a lot more secure than “Password1” or your mother’s Maiden name.
Here is a good list of password managers to research.
2 Factor Authentication
There are some downsides to 2 Factor Authentication, as some high-profile hacks have been caused by 2FA manipulation. However, industry experts tend to agree it is better than simply using your password.
Having a 2nd layer of protection should stop most basic social engineering hacks. In fact, Microsoft believes it could contribute to stopping 99.99% of hacking attempts on their accounts.
Regularly Auditing Employee Access
Disgruntled former employees with access to your data are not a good combination. With so many various access points, proper security audits must be done when someone leaves your organization. Think of social media platforms and other third-party software services with shared logins and ensure access is revoked.
Locking Idle Computer Screens
Your bathroom break could become a security crisis unless you take precautions and lock your screen. Mobile phones tend to have this built-in, but the behavior doesn’t always translate to laptops or desktops.
Building a culture of security should start with locking your screen, and if you want to be extra safe, there are numerous ways you can automatically lock your screen when you go inactive. Here is how to do it for Windows.
Phishing is obtaining data via fraudulent means, often by disguising oneself as a trustworthy partner. This type of attack is common in email, through duplicated sites, or instant messaging.
Educating your staff on Phishing is important as human error is the number one cause of serious attacks.
Phishing.org is a good resource for information on Phishing.
Up to date Firewall
Firewalls keep a lot of the bad stuff out and are a worthy investment for all business types. However, an outdated firewall is not much use. Threats evolve constantly, and it’s important to keep your firewalls up to date with the latest version.
Update your Software too
On the topic of keeping things up to date, it’s important that you continually ensure your software stack & operating systems are up to date with the latest versions. Companies continually release patches and bug fixes and publish the vulnerabilities that are resolved. This is great unless you are using an old version of the software, then it serves as a road map for an attack.
Create An Incident Response plan
The size of your organization will determine what kind of incident response plan is necessary, but every business should consider the worst and plan for it. By preparing contingencies, you can mitigate the damage caused by an attack. Here is a good guide for SMEs.
Continuous Security & Vulnerability Assessments
By continually testing your website and /or web app (s), you will know your vulnerabilities before any hackers do.
While it sounds intimidating, it doesn’t have to be difficult. We’ve built our software to be extremely user-friendly, and you can set up a scan of your site within 2 minutes.
You can start your journey towards Continuous Security today. We offer a 14 Day Free Trial to test all your web applications.