• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar

Tampa Bay News Wire

All news... no paywalls

  • Submit a Release
  • Contact Us
You are here: Home / Science, Technology, Security, Software, Social Media / CYBER DEFENSE -Don’t Think It’s That Easy!

CYBER DEFENSE -Don’t Think It’s That Easy!

July 8, 2021 by Post

[Dateline: Safety Harbor, FL, 7/7/21] — [Alaris Threat Management Consultants is a leading provider of cyber defense for small- to medium-sized healthcare and medical practices. This article is an introduction to the current threat posed by ransomware.] 

Safety 101…

You may think some of the following rules to protect your firm from Black Hat Cyber Criminals are obvious, but you would be surprised! It only takes one person in your firm to be oblivious and counter all your best intentions. Educate employees often and follow these general “How To’s” to keep your firm safe!

  • Do not open suspicious attachments or click unusual links in messages, email, tweets, posts, or online ads.
  • Make sure every employee is reminded and updated on policies!
  • Do not have work-related conversations in the presence of smart devices such as voice assistants.
  • Require strong passwords to protect data and to access devices. Make sure you have a policy in place to change employee passwords at least every thirty days.
  • Use two-factor or multifactor authentication to access firm information and firm networks.
  • Do not utilize unsecured or public WiFi when accessing or transmitting client information.
  • Use a virtual private network (VPN) when accessing or transmitting client information.
  • Keep all antivirus, anti-malware and software up to date – have gatekeepers in charge of daily updates!
  • Supply or require employees to use secure and encrypted laptops.
  • Minimize USB drives or other external devices unless owned by the firm.
  • Have written communication policies regarding how and where data created remotely will be stored and backed up.
  • Save data on the office network, not personal devices.
  • Use reputable vendors for cloud services.
  • Encrypt emails and electronic records, including backups, to protect sensitive information from unauthorized disclosure.
  • Use websites that have enhanced security whenever possible.
email
print

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Related

Filed Under: Science, Technology, Security, Software, Social Media

Primary Sidebar

Categories

39 Users Online
1 User Browsing This Page.
Users: 1 Bot

Connect with us

  • View madduxbusinessreport’s profile on Facebook
  • View tbnwire’s profile on Twitter

RSS feed


39 Users Online

© 2023 KnowHowe