10 Reminders for National Cyber Security Awareness Month
October 20, 2017 By Christopher George cybersecurity
Each October, the Department of Homeland Security spearheads a campaign to remind businesses and individuals of the importance of cybersecurity. This campaign, known as National Cyber Security Awareness Month (NCSAM), is designed to provide internet security education, as well as the tools and resources needed for internet safety. With an average total data breach cost of $7.35 million, protecting your data from a cyber attack is crucial to business longevity.
Protelligent® knows the importance of a developing a strong cybersecurity policy. We are dedicated to helping businesses integrate security solutions that will prevent a malicious attack. As part of Protelligent’s commitment to safeguarding your business against cyber attacks, we have compiled the following 10 reminders to help ensure your information is protected from cyber criminals.
- Limit vulnerabilities by ensuring operating systems, web browsers and security software are updated regularly. Updating your devices and software to the most recent versions helps protect you from attackers who are looking for known vulnerabilities.
- Use stronger authentication, which is available on most major email, social media and financial accounts. This authentication often requires verification via a one-time code delivered to a registered email address or via text to a mobile device, which helps verify the account is being accessed by an authorized user.
- Never click on links in an email or in social media posts that look suspicious, even if you know the sender or poster. Cyber criminals use these links to gain access to your account information, and then pass the infected link on to your contact list.
- Use complex passwords that are a minimum of eight characters and include a combination of numbers, symbols and letters. Use a different password for each account, and never share your username or password with anyone. You can find more information on creating a strong password on the Department of Homeland Security’s website.
- Secure your WiFi network by changing the factory default username and password settings. This helps ensure cybercriminals will not be able to gain access to connected devices.
- Create a copy of all important work. Utilize both electronic (cloud) and physical back-ups to prevent data from being lost due to malfunction, viruses or theft.
- Lock your devices when they are not in use and never leave them unattended in a public place.
- Report suspicious activity or unusual problems with your device to your IT Department. Computer or network vulnerabilities can also be reported to the United States Computer Emergency Readiness Team (US-CERT) at us-cert.gov or by calling 888-282-0870.
- Limit the information you share online and use privacy settings to prevent information from being made public. Avoid accessing bank accounts from a public computer or WiFi network.
- Verify website security by ensuring website URLs start with “https.” Type URLs directly into the address bar rather than clicking on links or pasting them from an email.
Data breach attempts are not limited to large businesses, in fact small business makes up 43% of the target base, with 60% of those companies going out of business within 6 months of the data breach. If not properly protected, your systems and software can be a gateway for cyber criminals to launch an attack. Protelligent’s Premonition Security Suite provides a collaborative and responsive security platform specifically designed to assess your security needs and rapidly respond to threat activity.
Learn more about how Protelligent’s Premonition™ Security Suite can level the playing field for your organization or contact us today at (855) PRO-TELL.
Recent Posts
Archives
- August 2020 (1)
- July 2020 (1)
- June 2020 (1)
- May 2020 (1)
- April 2020 (1)
- March 2020 (1)
- February 2020 (1)
- January 2020 (1)
- December 2019 (1)
- November 2019 (1)
- October 2019 (1)
- September 2019 (2)
- July 2019 (1)
- June 2019 (3)
- April 2019 (1)
- March 2019 (1)
- February 2019 (1)
- January 2019 (1)
- December 2018 (1)
- November 2018 (1)
- October 2018 (1)
- September 2018 (1)
- August 2018 (1)
- May 2018 (1)
- March 2018 (1)
- February 2018 (1)
- January 2018 (2)
- December 2017 (2)
- November 2017 (3)
- October 2017 (3)
- September 2017 (2)
- August 2017 (3)
- July 2017 (2)
- June 2017 (5)
- May 2017 (7)
- April 2017 (5)
- March 2017 (5)
- February 2017 (1)
- January 2017 (5)
- December 2016 (1)
- October 2016 (4)
- September 2016 (1)
- August 2016 (3)
- July 2016 (1)
- June 2016 (1)
- May 2016 (1)
- April 2016 (1)
- November 2014 (1)
- July 2014 (2)
- June 2014 (1)
- May 2014 (3)
- April 2014 (3)
- March 2014 (1)
- February 2014 (2)
- January 2014 (3)
- December 2013 (1)
- November 2013 (4)
Categories
- Community (19)
- Cloud (18)
- IT (16)
- cloud backup (16)
- cybersecurity (15)
- cloud backup data recovery (9)
- cloud computing (8)
- clouddr (8)
- it security (8)
- cloud storage (7)
- data security (7)
- AWS (6)
- Education (6)
- cloud services (6)
- Giving Back (3)
- cloud restoration (3)
- compliance (3)
- data (3)
- assessment (2)
- business (2)
- chief information officer (2)
- client satisfaction (2)
- cloud data recover (2)
- cloud dr (2)
- critical power exchange (2)
- cyber (2)
- cyber responsibility (2)
- data recover (2)
- datacenter (2)
- duo security (2)
- end-to-end encryption (2)
- hackers (2)
- holiday season (2)
- internet (2)
- storage (2)
- 2019 goals (1)
- Android (1)
- Arts (1)
- Business Continuity (1)
- CASBO (1)
- Cisco Cloud Web Security (1)
- Cisco Security Intelligence Operations (1)
- Custom Design (1)
- Graphics (1)
- Protelligent (1)
- Virus (1)
- account protection (1)
- advanced persistent threats (1)
- alien vault technology (1)
- alienvault technology (1)
- antivirus program (1)
- antivirus software (1)
- apis (1)
- apt (1)
- attachment (1)
- attack (1)
- automatic updates (1)
- awareness (1)
- backup (1)
- benefits (1)
- best practices (1)
- bot-driven attacks (1)
- bring your own device (1)
- bug (1)
- business growth (1)
- byod (1)
- california joint powers insurance authority (1)
- california jpia (1)
- check cashing (1)
- cisco (1)
- cjpia (1)
- client testimonial (1)
- cloud backup vs cloud storage (1)
- cloud computing services (1)
- cloud conversion (1)
- cloud migration (1)
- cloud recovery (1)
- community link consulting (1)
- compliance program (1)
- compliance regulations (1)
- computer science (1)
- computer security (1)
- computers (1)
- contain attacks (1)
- cost of cybercrime (1)
- cost of data breach study (1)
- critical power (1)
- critical power products & services (1)
- customer testimonial (1)
- customer testimonial video (1)
- cyber liability (1)
- cyber-threat (1)
- cybercrimes (1)
- cybercriminals (1)
- cybersecurity program (1)
- data access (1)
- data breach (1)
- data breach protection (1)
- data center (1)
- data encryption (1)