MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

In February of 2016, President Barack Obama passed a Cybersecurity National Action Plan. The plan implemented near-term actions and developed a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, and maintain public safety. Taking action against cybersecurity now will assist with ensuring economic and national security, as well as empowering Americans to take better control of their digital security.

For a small business, it’s even more important to avoid becoming a cybercrime victim. Data loss, downtime, fines/restitution, and lost time and resources are just a few things that you might be forced to endure as a result of falling prey to a hacker. Here’s a list of actions that the FBI recommend you take to help protect your company from being a victim of ransomware.

  • Raise Awareness: Make sure employees are aware of ransomware and of their critical roles in protecting the organization’s network and data.
  • Updates and Patches: Patch operating system, software, and firmware on digital devices (which may be made easier through a centralized patch management system).
  • Auto Update Security Software: Ensure anti-virus and anti-malware solutions are set to automatically update and conduct regular scans.
  • Limit Super Users: Manage the use of privileged accounts—no users should be assigned administrative access unless absolutely needed, and only use administrator accounts when necessary.
  • Access Control: Configure access controls, including file, directory, and network share permissions appropriately. If users only need read-specific information, they don’t need write-access to those files or directories.
  • Filters and Application Control: Implement software restriction policies or other controls to prevent programs from executing from common ransomware locations (e.g., temporary folders supporting popular Internet browsers, compression/decompression programs).
  • Data Backup & Disaster Recovery Plan: Backup data regularly and verify the integrity of those backups regularly.
  • Multiple Storages: Make sure backups are not stored or connected to the computers and networks they are backing up.

Given the extreme measures that governments have taken to prevent cybercrime, it’s a safe bet that businesses of every size should follow suit. Would you like to keep on top of all the latest news and information from the FBI’s cyber security division? Visit: your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 22 November 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Privacy Business Computing Best Practices Hackers Malware Software Network Security Hosted Solutions Backup google Internet Productivity Computer Microsoft Disaster Recovery Business Continuity Managed IT Services Business IT Support Windows 10 VoIP Outsourced IT IT Services User Tips Innovation Business Management Hardware Mobile Devices Mobility communications Managed IT Ransomware Efficiency Email Smartphone Windows Mobile Device Management Productivity Small Business Save Money Cybercrime Saving Money Telephone Systems Server Apps Cybersecurity Law Enforcement Data Backup Operating System Hosted Solution Quick Tips Android Virtualization BDR Money Information Technology Chrome Recovery VPN Microsoft Office Data Recovery Passwords browser BYOD Data Password Miscellaneous Managed Service Provider Computers Cloud Computing Work/Life Balance Social upgrade Budget Smartphones Communication Data Management Office 365 Facebook Government Wireless Google Drive Hacking Avoiding Downtime Unsupported Software Health Holiday Managed IT Services Office tips Applications Private Cloud Shortcut Proactive IT Social Media Best Practice Wi-Fi Data Security Firewall search Application App Current Events Audit Personal Information Politics USB Save Time Automation Telephony Gadgets Risk Management Alert Workplace Tips Phishing Users Encryption DDoS Identity Theft Robot Data Storage Television Artificial Intelligence History Flexibility End of Support Social Engineering Remote Computing Streaming Media Apple Cost Management Internet of Things WiFi The Internet of Things SaaS Humor Going Green Disaster Google Docs Bandwidth Samsung Antivirus Content Filtering Battery Employer-Employee Relationship HaaS Data Protection Compliance Network Sports IT Support User Error Automobile Commerce Hacker Solid State Drive Internet Exlporer Wireless Technology Gmail Saving Time Cleaning Windows 10 Office Update Computer Care Phone System iPhone Vulnerability Spam IT solutions Mobile Computing Transportation iOS Text Messaging Excel Windows Ink WSJ Employer Employee Relationship Comparison Exchange Analytics Keyboard Computer Fan Instant Messaging Distributed Denial of Service Regulation altivista Google Maps Computer Accessories OneNote Worker Commute Specifications Mobile Device Screen Mirroring SBS Big Data Data Breach compaq Dark Web Managing Stress Laptop Uninterrupted Power Supply Sync Software as a Service Meetings Scalability Sales Wearable Technology Cast Books Emails hp Hiring/Firing Education Touchpad Adobe Data Loss Vendor Management Settings Router Reputation How To Advertising Retail domain Marketing Benefits Licensing Data storage Unified Threat Management HBO remote Webinar Yahoo eWaste Mobile Chromecast Microsoft Excel Training Entertainment Administration Running Cable Upgrades Server 2008 Electronic Medical Records IT solutions Ali Rowghani Collaboration Point of Sale Professional Services Trending File Sharing Company Culture HIPAA Colocation Black Market Hard Drives Tech Support Consultant IT Management Windows 10s Smart Technology Nanotechnology Files Travel Administrator Storage Lithium-ion battery Value Avoid Downtime Shadow IT Two-factor Authentication WIndows Server 2008 server installation dvd "cannot install required files" Hard Disk Drive stock Root Cause Analysis Document Management Tablets Access Cortana Experience Relocation Patch Management tweet Augmented Reality NFL Lifestyle Business Intelligence Touchscreen Video Games Virtual Reality PDF Outlook calculator Word Twitter Scam Legislation Managed IT Service control Music Legal CrashOverride WannaCry Cache Monitors Remote Monitoring Safety Emergency Thank You Congratulations Worker

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...