p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; line-height: 21.0px; font: 20.0px Times}
No organization, regardless of its size or industry sector, is safe from a malicious cyber attack.
Managing risk requires total involvement
- What is the impact to my business operations if my systems are not available?
- What is the impact to my business operations if my website is taken down and not available for any periodof time?
- Â What would happen to my business if my business information is made public?
- What would happen to my business if my publicly available information is not correct?
Â
No organization is safe
- Identify
- Protect
- Detect
- Respond
- Recover
Best practices to follow
- Backup regularly and keep a recent backup copy off-line and off-site. There are dozens of ways other than ransomware that files can suddenly vanish, such as fire, flood, theft, a dropped laptop or even an accidental delete. Encrypt your backup to lessen the worry about the backup device falling into the wrong hands.
- Move your data out of the closet and into the cloud.
- Be cautious about unsolicited attachments in emails. Criminals are relying on the dilemma of whether you should open a document or not unless you are sure of its contents. If in doubt, do not open it.
- Don’t give yourself more login authority than you need to do your job. Don’t stay logged in as an administrator any longer than is strictly necessary and avoid browsing, opening documents or other regular work activities while using administrator rights.
- Patch early and often. Malware that doesn’t come in via a document often relies on security bugs in popular applications, including Microsoft Office, your browser, Flash and more. The sooner you patch, the fewer holes there are to be exploited.
- Stay up-to-date with new security features in your business applications.Â