Here are a few tips and some suggestions for what you can do to avoid a data breach that jeopardizes your company.

  1. Make sure to have STRONG password policies and enforce them.

    The absolute buzz kill for cybercriminals is a strong password. Remember, often the person trying to crack your code isn’t really a person. Artificial Intelligence can do in seconds what it would take a cyberhacker to do in months or even years.

    Weak passwords and compromised credentials are to blame for 4 out of 5 breaches. According to some security experts, unless strong multifactor authentication is universally in use, the minimum length for a strong password is 16 characters, 25 characters if you have a privileged administrator account. Don’t take the easy way out when it can cost you your business. Train your team on creating strong passwords and run periodic dark web scans to see if any credentials have been compromised.

    PS. If you need a Dark Web Scan for your company? Contact Brian at brian@tech2020solutions.com

  2. Update your software to close any “back doors” and patch application vulnerabilities.

    Why try so hard to hack a business when others leave the door WIDE open? Those pesky reminders to update your software are there for a reason. Make sure that when updates are available you do them. This will go a long way in keeping your network system much safer in light of cyber danger.

  3. Be on constant look out for Malware & Social Engineering Schemes

    The crazy thing about malware is that despite even the most stringent and robust security standards and equipment, malware is the cyber beast that YOU INVITE in. By accessing websites that may not be what they seem or opening attachments or links in emails that don’t feel “quiet right” or you are not expecting, you could be opening the door to a Malware attack and unknowingly enabling the attacker to download software that gives them access to your computer.

    Practice extreme caution whenever opening an attachment. Remember if it sounds too good to be true, it probably is and worse yet, could create a new access point to exploit your system. Be wary, hackers are getting very clever, and disguising communications to look like other, “normal” communications that you conduct day to day.

    Make sure you take your time when you are looking through email or surfing the web for information. If you need to, double check with the sender to make sure what it is and that it was intended to come to you. Remember that Malware not only infects your computer system but it can potentially make the leap to other systems on your network.

  4. Don’t have too many cooks or permissions in the “kitchen”

    Make sure that only the people that need to know, have access to the critical, proprietary and confidential information for your organization. Having too many people in and out of sensitive or administrative files is a recipe for disaster. Limit the number of people with access and track this to make any updates should an employee leave or change position that no longer requires the access.

  5. Shore up the fortress against physical breaches or attacks

    How secure is your office and your building? Hacking is a big business, with real money behind it, so do not underestimate the potential for someone to literally walk in and off with your data and network information. Even well meaning, or not so well-meaning employees, that have access to your systems can become a problem if they have access to your server when they shouldn’t. Make sure that your server and access to any of your network computer systems is always secure and protected.

  6. Strongly consider getting Cyber Insurance now!

    Unfortunately, it may not be a matter of if you get hit by a hacker, but when. Having a good cyber insurance policy in place can help you recover from an attack and get back up and running. If you need a referral, we’ve got a few great companies you can talk to. Just ask!
Taking a multi-prong approach to cybersecurity is important to avoid a data breach. Getting your staff trained on your IT policies and your cybersecurity procedures is also important. Finally knowing what you are up against, and if you have already been breached in some ways is important information to know. We can help you with all of this, and more.
 
Contact us today if you would like to learn more!