Simple Steps to Protect Your Business from Cyber Attacks

Is your business cyber secure? There are simple steps you can take right now to improve your cybersecurity posture and protect your business from the countless cyberthreats the corporate world faces on a daily basis. To help shed light on this important subject, on June 8, Associated Industries of Massachusetts (AIM) hosted a webinar titled "Surviving a World of Cyberterrorism." Our Vice President of Technology, Jeffery Lauria, was asked to present during this webinar as a subject matter expert.

Here are the top five topics discussed in our cybersecurity webinar:

Here are some of the topics that were covered:

  1. Tips to protect your company
  2. Real life examples of cybercrime
  3. Business impact of cyber attacks
  4. Technologies that can be employed to safeguard your company
  5. Types of ransomware and phishing attacks, and how to spot them

To watch the full presentation, check out the following video:

 

Top Webinar Highlights

Here are some of our top cyber security tips:

  1. Educate your employees
  2. Perform daily data backups
  3. Laptops should be encrypted
  4. Make password changes mandatory
  5. Perform routine network penetration testing
  6. Use a reputable anti-malware and anti-virus
  7. Implement multi-factor authentication and SSO
  8. Endpoint management solutions such as InTune
  9. Consider a cyber insurance policy for your organization
  10. Ensure offsite storage of backups and cloud recovery solutions
  11. Be wary of email-only wire transfer requests, requests with urgency messaging, and verify suspicious email accounts or messages
  12. Monitor your third parties - monitoring must cover all activities related to use, including risk-ranking, screening, data collection, documentation, and ongoing monitoring 

 

For more information about securing your employees, reach out to iCorps for a free consultation

Contact for a Free Consultation

Related Content:
What to Do If Your Business Is Still Running Windows 7
7 IT Issues Your IT Team Can Be Ignoring