MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

In February of 2016, President Barack Obama passed a Cybersecurity National Action Plan. The plan implemented near-term actions and developed a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, and maintain public safety. Taking action against cybersecurity now will assist with ensuring economic and national security, as well as empowering Americans to take better control of their digital security.

For a small business, it’s even more important to avoid becoming a cybercrime victim. Data loss, downtime, fines/restitution, and lost time and resources are just a few things that you might be forced to endure as a result of falling prey to a hacker. Here’s a list of actions that the FBI recommend you take to help protect your company from being a victim of ransomware.

  • Raise Awareness: Make sure employees are aware of ransomware and of their critical roles in protecting the organization’s network and data.
  • Updates and Patches: Patch operating system, software, and firmware on digital devices (which may be made easier through a centralized patch management system).
  • Auto Update Security Software: Ensure anti-virus and anti-malware solutions are set to automatically update and conduct regular scans.
  • Limit Super Users: Manage the use of privileged accounts—no users should be assigned administrative access unless absolutely needed, and only use administrator accounts when necessary.
  • Access Control: Configure access controls, including file, directory, and network share permissions appropriately. If users only need read-specific information, they don’t need write-access to those files or directories.
  • Filters and Application Control: Implement software restriction policies or other controls to prevent programs from executing from common ransomware locations (e.g., temporary folders supporting popular Internet browsers, compression/decompression programs).
  • Data Backup & Disaster Recovery Plan: Backup data regularly and verify the integrity of those backups regularly.
  • Multiple Storages: Make sure backups are not stored or connected to the computers and networks they are backing up.

Given the extreme measures that governments have taken to prevent cybercrime, it’s a safe bet that businesses of every size should follow suit. Would you like to keep on top of all the latest news and information from the FBI’s cyber security division? Visit:



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, June 22 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Business Computing Network Security Hackers Malware Software Productivity Internet Hosted Solutions Backup Business Management google Computer Managed IT Services Mobile Devices Disaster Recovery Outsourced IT Microsoft communications VoIP Business Continuity Business Windows 10 IT Support Hardware Innovation Email User Tips Cybersecurity IT Services Data Backup Efficiency Cybercrime Data Recovery Managed IT Server Ransomware Small Business Apps Tech Term Saving Money Windows Mobility Mobile Device Management browser Data Productivity Law Enforcement Internet of Things Smartphone Operating System Android Office 365 Virtualization Telephone Systems BDR Save Money Passwords Phishing Money Data Security Cloud Computing Smartphones Hosted Solution Quick Tips Microsoft Office BYOD Automation Password Holiday Managed Service Provider Information Technology Chrome Recovery Communication VPN Government Google Drive Hacking Avoiding Downtime Vulnerability Update Alert Gadgets Two-factor Authentication Health Miscellaneous Wireless Computers Data Breach Risk Management Unsupported Software Best Practice Social Social Media upgrade App Budget Data Management Work/Life Balance Collaboration Cost Management IT Support Network Wi-Fi Application Facebook Current Events Audit Wireless Technology Gmail Compliance Personal Information Spam Telephony Politics Workplace Tips Managed IT Services Cleaning USB Applications Private Cloud Save Time Office tips History Social Engineering Remote Computing Streaming Media Proactive IT Identity Theft The Internet of Things search Artificial Intelligence Flexibility Shortcut Data Protection Employer-Employee Relationship Firewall Tech Support User Error Antivirus Content Filtering Hacker Project Management Internet Exlporer Cortana Battery Solid State Drive Patch Management HaaS Windows 10 iPhone Automobile IT solutions Wireless Charging Excel Mobile Computing Value Transportation Data Storage DDoS Saving Time Management OneNote Robot Blockchain Office Television Phone System Computer Care End of Support Apple Legal Mobile Security Users Data Loss Encryption Devices Marketing WiFi Google Docs Google Assistant Humor Disaster Going Green Big Data Bandwidth Fraud eWaste Education Router Sports Vendor Management Redundancy SaaS Commerce Samsung Unified Threat Management Lithium-ion battery Tablets Smart Tech Root Cause Analysis Administrator Gamification server installation dvd "cannot install required files" Entertainment stock Websites Training FAQ Upgrades Electronic Medical Records NFL Connectivity Relocation Augmented Reality Access MSP Touchscreen Lifestyle Point of Sale Memory Business Intelligence HIPAA tweet Outlook Data Theft Company Culture Charger Consultant Safety Word Black Market Content Filter intranet Smart Technology Legislation Students PDF calculator Managed IT Service Twitter Avoid Downtime Computing iOS Windows Ink Shadow IT Monitoring control IT budget Comparison Document Management Unified Communications Text Messaging Evernote Experience WSJ Regulation Analysis Computer Fan Google Maps Exchange Maintenance altivista Screen Mirroring Distributed Denial of Service Specifications Financial Networking Sync Video Games App store Dark Web Software as a Service Virtual Reality Financial Technology SBS Meetings Device Security compaq Cast Identities Laptop Emails Uninterrupted Power Supply Scam Sales Workers Music Adobe Wearable Technology Printing Settings hp IoT Touchpad Employer Employee Relationship Retail Updates Analytics Licensing Identity Reputation WannaCry Keyboard Instant Messaging Advertising domain Spyware HBO Language Webinar Computer Accessories Conferencing Worker Commute Microsoft Word Mobile Data Privacy Mobile Device Data storage Microsoft Excel Managing Stress Computer Forensics remote Remote Monitoring Yahoo IT solutions Gifts Books Professional Services Scalability Hard Drive Administration Chromecast Edge Hiring/Firing Running Cable File Sharing PowerPoint Server 2008 Ali Rowghani IT Management Virus Windows 10s Trending Travel How To Chromebook Colocation Nanotechnology Ciminal Benefits Storage Wireless Internet Hard Drives WIndows Server 2008 Proactive Hard Disk Drive Files Credit Cards Thank You Congratulations Emergency CrashOverride Worker Cache Monitors

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...