Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the rank-math domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u596154002/domains/usbusinessreviews.com/public_html/wp-includes/functions.php on line 6114
Want to boost you cybersecurity? Here are ten steps you can take to improve your defenses now - Best Business Review Site 2024

Want to boost you cybersecurity? Here are ten steps you can take to improve your defenses now

[ad_1]

Ukraine was being hit by cyber-attacks well before Russia launched its invasion. DDoS attacks and wiper malware were among the cyber threats which targeted Ukrainian government ministries, banks, media and other services, but there are also other examples from recent history.

Russia has been accused of being behind attacks that took down Ukrainian power grids in December 2015, and it’s thought that the Russian military was also behind the widespread and disruptive NotPetya malware attack of June 2017. NotPetya was designed to target organisations in the Ukrainian financial, energy and government sectors, but the impact quickly spread to organisations around the world. 

And as the conflict continues, firms far from that geography have been urged to check their security posture. As NCSC CEO Lindy Cameron commented just a few days ago “Cyber attacks do not respect geographic boundaries” warning that cyber attacks that have international consequences – intentional or not. 

The NCSC has urged organisations to take action to secure their networks. And there are steps which can be taken – some of which are relatively simple – which can increase resilience against most any cyber attacks. 

1. Apply patches and security updates 

Applying patches and security updates to operating systems and software is the best way to close vulnerabilities in networks. Many cyber attacks actively look to exploit unpatched software as an easy backdoor into networks. Devices and software with known security vulnerabilities should be patched immediately. 

2. Use strong passwords  

A common way for cyber attackers to breach networks is to simply guess usernames and passwords – particularly if the organisation uses cloud services like Microsoft Office 365 or Google Workspace. Users should be urged not to use common, easy to guess passwords and instead to manage passwords with a password manager. Any devices on the network with default passwords should have them changed. 

3. Use multi-factor authentication 

Multi-factor authentication (MFA) provides an additional barrier to cyber attacks and should be applied to all users. The benefit of multi-factor authentication is that even if a username and password has been stolen or correctly guessed, it’s still very difficult for attackers to access the account. If MFA is correctly configured, the user will be alerted to any attempts to login to their account – and they are alerted to an attempt to access an account and it wasn’t them, they should be encouraged to report it to the information security team. 

SEE: Cybersecurity: Let’s get tactical (ZDNet special report)

4. Teach phishing awareness 

Many cyber attacks start with phishing emails and staff should be trained in how to identify some of the most common techniques cyber attackers use, as well as how to report phishing emails for further investigation. Some phishing attacks are more sophisticated and harder to identify, but even in those cases, if a user thinks they’ve fallen victim to a phishing attack, they should be encouraged to come forward – without repercussions – in order to help identify and detect the attack in order to remove the intruders and secure accounts. 

5. Use antivirus software and ensure that it works 

Antivirus software and firewalls can help to detect suspicious links, malware and other threats distributed by cyber attacks and they should be installed on every device. Like other software, it’s important to confirm that antivirus software is up to date with the latest updates and that it’s active and working correctly. 

6. Know your network

You can’t defend your network if you don’t know what’s on it, so information security teams should actively be able to identify all devices and users on the network – as well as being able to detect potentially suspicious activity. If a device or user account is acting unusually, by accessing files they don’t need for their job, or moving to parts of the network that are irrelevant to them, it could be an indication that their account has been compromised by cyber criminals attempting to plant malware. Keep logging activity for at least month, so older activity can be traced to identify how a breach happened. 

SEE: A winning strategy for cybersecurity (ZDNet special report)

7. Backup your network – and regularly test backups 

Backups are a vital component to ensuring cyber resilience and they can play a big role in minimizing disruption in the event of a cyber attack, particularly ransomware or wiper malware. Backups should be made at regular intervals, a copy of the backups should be stored offline and they should be regularly tested to make sure they work. 

8. Be mindful of third-party access to your network and supply chains 

Managing IT networks can be complex and that sometimes requires organisations to bring in outside help, providing non-regular users with high level access. Organisations should have a comprehensive grasp on what access outside users can have and be mindful of removing security controls.  

Any access that’s no longer required should be removed. Organisations should also attempt to understand the security practices of businesses in their supply chain – it’s possible that if one of those is breached, their network could be used as a gateway to the larger target. 

9. Have an incident response plan 

Even if organisations have followed all of the relevant advice, they should still draw up a plan of how to react in the event of a cyber attack. For example, if the network is down, how will they communicate a response? Thinking about different scenarios, plannning ahead and running training exercises can reduce the impact of a successful cyber attack. 

“Organisations should recognise the risk that cyber presents to their operations and ensure that they have strong cyber resilience and an ability to detect, respond and remediate threats, and make sure plans are in place to counter any disruptive attacks,” says Stuart McKenzie, SVP of consulting at Mandiant. 

10. Brief the wider organisation about cyber threats 

It’s the job of information security to know about cyber attacks and how to deal with them, but outside the cybersecurity team, it’s unlikely to be common knowledge. Staff ranging from the boardroom to juniors should be aware of the importance of cybersecurity and be made aware of how to report suspected security events. In order for a business to be secure, it’s crucial for everyone to play a part. 

MORE ON CYBERSECURITY

[ad_2]

Source link

slot gacor slot gacor togel macau slot hoki bandar togel slot dana slot mahjong link slot link slot777 slot gampang maxwin slot hoki slot mahjong slot maxwin slot mpo slot777 slot toto slot toto situs toto toto slot situs toto situs toto situs toto situs toto slot88 toto slot slot gacor thailand slot bet receh situs toto situs toto slot toto slot situs toto situs toto situs toto situs togel macau toto slot slot demo slot pulsa slot pragmatic situs toto deposit dana 10k surga slot toto slot link situs toto situs toto slot situs toto situs toto slot777 slot gacor situs toto slot slot pulsa 10k toto togel situs toto slot situs toto slot gacor terpercaya slot dana slot gacor pay4d agen sbobet kedai168 kedai168 deposit pulsa situs toto slot pulsa situs toto slot pulsa situs toto situs toto situs toto slot dana toto slot situs toto slot pulsa toto slot situs toto slot pulsa situs toto situs toto situs toto toto slot toto slot slot toto akun pro maxwin situs toto slot gacor maxwin slot gacor maxwin situs toto slot slot depo 10k toto slot toto slot situs toto situs toto toto slot toto slot toto slot toto togel slot toto togel situs toto situs toto toto slot slot gacor slot gacor slot gacor situs toto situs toto cytotec toto slot situs toto situs toto toto slot situs toto situs toto slot gacor maxwin slot gacor maxwin link slot 10k slot gacor maxwin slot gacor slot pulsa situs slot 10k slot 10k toto slot toto slot situs toto situs toto situs toto bandar togel 4d toto slot toto slot situs toto toto slot toto togel