9 Ways to Protect Your Business from Cyber Criminals Get Educated Understand what data you store and what vulnerabilities you have. Provide ongoing security aware- ness training and information to your employees and phish-test them regularly. Secure Your Bank Accounts If it is offered, configure Multi-Factor Authentication (MFA), also known as Two-factor Authentication (2FA), on your accounts. If it is not offered, consider switching banks. Setup controls and limits on ACH and wire-transfers. If it is offered, consider signing up for paper check positive pay. Level-up Your Cyber Insurance If you haven’t reviewed your cyber security insurance coverages and limits within the past year, call your insurance broker and make sure the coverages you have are adequate for the risks you have in your business. If your broker isn’t familiar with cyber risks, find one who is. Reduce Your Online Exposure Do not publish any company email addresses on the Internet, especially on LinkedIn. That just invites more phishing email into your company, which increases your risks. Tip: Google employee email addresses, surrounded by quotations ( for example: “myemail@domain .com” ) to see where it might be listed, and have it removed, if possible. Use Good Password Practices Use different passwords for every different website and online service you access and change them periodically. Use Multi-Factor Authentication (MFA), also known as Two-factor Authentication (2FA), wherever possible. Use 12 digit or longer passphrases or auto-generat- ed passwords. Use a password manager like Lastpass with MFA enabled. Backup and Secure Your Data Ensure that you have at least daily backups of your data, and that those backups are not accessible from any workstation that could be compro- mised. Occasionally test your backups by restoring some test information. If you carry data on a laptop or mobile device, ensure that it is encrypted. Keep Software Updated Most of today’s malware takes advantage of known vulnerabilities in both the operating system and applications. Keep Windows, Mac OS and all those apps you have up to date. It’s just that simple! Use Endpoint Protection Use a next-generation endpoint protection suite that provides prevention, detection, remediation and forensics. It should feature behavior-based threat detection, not just signature-based detection. Ensure that all endpoints have protection and report into a central console that alerts when an issue is detected. Harden Your Perimeter and Monitor Your Interior Protect your network with current generation firewalls that properly control traffic into and out of your network. Inside your network, monitor and log traffic for suspicious activity. Monitor and collect logs on mobile endpoints no matter where they operate. Business Owner Some IT Experience Geek is the new Chic 9850 Redhill Drive. Cincinnati, OH 45242 • 513.469.6500 • www.intrust-it.com G e e k o m e t e r ( h o w g e e kta stic a r e y o u ? )