dowhilesys “HELPING SMALL - MEDIUM BUSINESS IN THE VALLEY”
Cybersecurity Assessment 95% of security breaches are made by human error.
Can your team spot the red flags in a phishing email?
Phishing
The fraudulent practice of sending emails pretending to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Social Engineering
Is the art of manipulating people so they give up confidential information. When individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software–that will give them access to your passwords and bank information as well as giving them control over your computer.
Passwords best practices
Never reveal your passwords to others
Use different passwords for different accounts and websites
Use Two-factor authentication
Use Length & complexity
Make passwords that are hard to guess but easy to remember
Use a password manager
Don’t write passwords in stickies
Cybersecurity Best Practices
Office
Computer
• Physical security, access and locks to IT communication equipment (MDF and IDF)
• Proper Firewall equipment and configurations
• Content Filters and Traffic Shaping rules
• Access Points (WIFI) with proper configuration and passphrase, avoid open WiFi
• Backups
• Guest WiFi for external users
• User CyberSecurity Training
• DNS (Umbrella) & SPAM (CPL) Protection is a plus
• Antivirus Software
• Windows firewall (OS)
• Operating system security software
• VPN client, recommended when not using a trusted network eg. traveling
• Backups
• DNS client is a plus
• 2 factor Authentication is a plus
We are here to help your business with our Cybersecurity trainings, recommendations and assessment of your business operations. Remember:
IT support is not just an option if you want your business to run smoothly, it's a necessity.
Interested, 15% off in your Cyber Security Assessment if you reach via this form!