Cybersecurity Checklist: Ensure Your Employee and Customer Data is Safe

Ashley Chambliss
keyboard, glasses, cup of coffee, to do list with action plan, pen, calculator and clip on a desk

With ongoing attacks and unstable political and social environments, now is the time to be certain your business is safeguarded from malicious cyber-attacks. As a business leader, it is undoubtedly critical for you to take the necessary steps to keep your business safe. 60% of businesses go out of business within 6 months of a cyber-attack. Don’t let this happen to you.  

Download Infographic: Cybersecurity Checklist 

Read the cybersecurity checklist and schedule an introductory meeting to start the conversation on getting your security strategies in place.  

Cybersecurity Checklist: 

  • Get cyber Insurance to financially recover from an attack  
  • Implement ongoing security awareness and phishing training for you and your employees 
  • Keep antimalware, computer operating system, and firewalls up to date 
  • Be suspicious of odd emails and check the spelling of email addresses by hovering your mouse over it 
  • Be suspicious of links and attachments in emails. Check the spelling of links by hovering your mouse over it. Do not click on or open suspicious attachments. 
  • Get click protection for your email systems, so if you do click on a bad link, it is less likely to hijack your computer. 
  • Do not click on ads on a webpage or news site. Ads on these sites can be made to look legitimate, but instead download malware 
  • Be careful what you post on social media and other publicly facing sites: address, email address, phone number, mother’s maiden name, pet’s name, birthdate, birthplace, bank account details 
  • Set unique complex passwords for every login. Easily track this by using a Password Keeper so you only need to remember one password 
  • Do not save store passwords on your web browser or computer, other than in password keeper 
  • Do not keep a company list of passwords. 
  • Do not use public WI-FI. Hackers can set up a look-alike public WI-FI that can read all the information your computer sends through it, including keyboard strokes 
  • Do not use public computers. They could record your every key stroke 
  • Call to verify ACH payment requests the first time or if changes 
  • Turn on two factor authentication to access your company's network and all web portals. That way bad actors need more than your password to access any information 
  • Enforce a complex password policy. The length of time it takes to crack a password grows exponentially with each character added.  9 characters can be cracked in 2 minutes, 10 characters in 2 hours, 11 characters in 6 days and so on 
  • Remove users’ local admin rights on their computers. By removing local admin rights, the risks from clicking on bad links in websites or emails is reduced because the corresponding action of downloading and executing a malicious payload is less likely to be successful. 
  • Isolate your backups and backup appliance from your network. When a cyber-attack happens, it is designed to run across the entire network in your business. By preventing your network from accessing your backups and backup appliance you protect yourself, in the event of an attack because you still have secured data to restore. 

This is just the beginning 

These cybersecurity basics are just the first steps to getting you and your team cyber-aware and cybersecure. Schedule an introductory meeting today to learn how we guide and implement IT best practices for your business’ highest safety and security.  

Download Infographic: Cybersecurity Checklist  

New call-to-action

STAY UP TO DATE

Subscribe to our email updates

STAY UP TO DATE

Subscribe to our email updates