Components of Cybersecurity

Cybersecurity components To Help Protect Your Business and to help keep your company safe.

Cybersecurity Pointers

1) Backups

How often do you backup? Where is that backup going? Who is responsible? Do you have one backup or backups of your backups? Do you know if they are working? Do you know how to access the data on the backups when you need it?

2) Updates

Do you follow the prompts to update your computers and software when asked? Or do you leave it, as these things tend to pop up at the most inconvenient times? Do you update your website to the latest version, and all periphery plugins? Are you on the latest versions of all within your IT setup?

3) Antivirus

You have this installed, of course you do. But is it good enough? Does your antivirus offer business standard protection? Do you have it installed on every device – even phones and tablets that require it? As above, is it up to date, you’re running the current version? Are you sure that it is working correctly?

4) Firewall

Do you have this as well as your Antivirus? Is your Firewall still using the “default” configuration, or has your IT specialist ensured that the settings are sufficient for your needs? Are you sure that your Antivirus and your Firewall are the most complimentary versions to work alongside each other?

5) Passwords

Does your company have a password hygiene policy? Do you have different passwords across the board or use the same default one wherever possible? Have you changed the passwords on all IT? Do you log into your website with the username Admin? Do your staff know the passwords for all computers/software programs? Do you change your passwords on a regular basis? Have you set up 2FA wherever possible?

6) Encryption

Is all of your data encrypted? Have you set up Admin rights across your company? Or can anybody within your business download/access anything they want? Is it possible that an employee could accidentally download a malicious program, or have you set permission levels to prevent this from happening?

7) Network

Is your WiFi protected? Encrypted? Who can log on to your network? Have you changed the passwords on your routers? If you have visitors to your workplace, are they given permission to access your WiFi? Can you connect to your network from outside your offices?

8) WFH/VPN

If your employees work outside of the office, how secure are they? Are they using a VPN to access company data? Can they access anything they want from wherever they want? Are they using their own, personal devices when working from home? Their own mobile phones, laptops, home-internet?

9) Procedures Reviews

When was the last time that you reviewed your company’s security procedures/set up? And when is the next time that you plan to review these? Who is responsible for checking your security processes? How are any findings reported/addressed?

10) Training

Do you provide everybody within your organisation with regular security training? Do all employees know of common security threats? Is there a procedure in place for training new staff? Is everybody aware of the latest threats and do they know what they need to do if they suspect there is an issue?

Source:
– US Bureau of Labor Statistics. „Information Security Analysts, https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm#tab-6.” Accessed September 27, 2023.


Сybersecurity. Open Source Solutions

Legislation. Сybersecurity