TEQ Magazine
(By Justine Kasznica)
Be Prepared
According to the CISA and the FBI the first and most important step towards protection is preparation. Being prepared includes creating, maintaining, and exercising a cyber incident response plan, resilience plan, and continuity of operations plan; ensuring personnel are familiar with key steps that must be followed during a cyber breach incident; identifying a resilience plan that addresses how to operate if you lose access to-or control of- your company’s systems; and implementing back data back-up procedures. In addition, companies need to minimize gaps by ensuring all security protocols and protections happen around the clock, including holidays and weekends.
Enhance the Organization’s Cyber Posture
Enhancing an organization’s cyber posture is imperative to its safety from any form of cyberattack. An organization may ensure proper identity and success management, protective controls and architecture, and vulnerability and configuration, by requiring strong passwords and multi-factor authentication for all users. By monitoring and detecting abnormal activity like various unsuccessful logins or unlikely geographic access, a company can spot attempted breaches early enough to prevent any damage from occurring. It is also helpful to update software in a timely manner and to be sure to use industry recommended antivirus programs.
Stay Vigilant
Simply implementing initial data privacy, security, and response measures is not enough. Cybercriminals and their methods are constantly evolving. Taking a proactive approach to data privacy and security, and being willing to invest in same, is vital to ensuring that a company’s safeguards are adequate and up-to-date. As necessary, internal and external annual audits and/or reviews of a company’s systems and policies is crucial to its data security. …