MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

In February of 2016, President Barack Obama passed a Cybersecurity National Action Plan. The plan implemented near-term actions and developed a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, and maintain public safety. Taking action against cybersecurity now will assist with ensuring economic and national security, as well as empowering Americans to take better control of their digital security.

For a small business, it’s even more important to avoid becoming a cybercrime victim. Data loss, downtime, fines/restitution, and lost time and resources are just a few things that you might be forced to endure as a result of falling prey to a hacker. Here’s a list of actions that the FBI recommend you take to help protect your company from being a victim of ransomware.

  • Raise Awareness: Make sure employees are aware of ransomware and of their critical roles in protecting the organization’s network and data.
  • Updates and Patches: Patch operating system, software, and firmware on digital devices (which may be made easier through a centralized patch management system).
  • Auto Update Security Software: Ensure anti-virus and anti-malware solutions are set to automatically update and conduct regular scans.
  • Limit Super Users: Manage the use of privileged accounts—no users should be assigned administrative access unless absolutely needed, and only use administrator accounts when necessary.
  • Access Control: Configure access controls, including file, directory, and network share permissions appropriately. If users only need read-specific information, they don’t need write-access to those files or directories.
  • Filters and Application Control: Implement software restriction policies or other controls to prevent programs from executing from common ransomware locations (e.g., temporary folders supporting popular Internet browsers, compression/decompression programs).
  • Data Backup & Disaster Recovery Plan: Backup data regularly and verify the integrity of those backups regularly.
  • Multiple Storages: Make sure backups are not stored or connected to the computers and networks they are backing up.

Given the extreme measures that governments have taken to prevent cybercrime, it’s a safe bet that businesses of every size should follow suit. Would you like to keep on top of all the latest news and information from the FBI’s cyber security division? Visit: https://www.fbi.gov/investigate/cyber/news.

e-max.it: your social media marketing partner
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 23 February 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Cloud Privacy Best Practices Business Computing Hackers Network Security Software Malware Internet Hosted Solutions Backup google Business Management Productivity Managed IT Services Computer Microsoft Disaster Recovery Mobile Devices Business Continuity Business IT Support Outsourced IT VoIP User Tips Windows 10 communications Innovation IT Services Email Productivity Hardware Cybercrime Mobility Efficiency Data Backup Windows Managed IT Mobile Device Management Ransomware Cybersecurity Apps Smartphone Server browser Telephone Systems Small Business Save Money Saving Money Data Recovery Law Enforcement Internet of Things Hosted Solution Quick Tips Operating System Android Virtualization BDR Passwords Money Password Information Technology Holiday Office 365 Recovery Data Security Chrome Microsoft Office BYOD VPN Data Miscellaneous Managed Service Provider Computers Work/Life Balance Phishing Gadgets Social Media Best Practice Budget Smartphones Data Management upgrade Social App Wireless Communication IT Support Risk Management Google Drive Hacking Unsupported Software Avoiding Downtime Facebook Cloud Computing Alert Government Health Vulnerability Flexibility Shortcut Office tips Applications Private Cloud History Wi-Fi Managed IT Services Proactive IT Firewall Workplace Tips Application Data Breach Current Events The Internet of Things Audit Social Engineering Personal Information Politics Two-factor Authentication search USB Collaboration Save Time Wireless Technology User Error Automation Identity Theft Telephony Windows 10 Artificial Intelligence Gmail Robot Spam Cost Management Update Excel End of Support Remote Computing IT solutions Data Storage SaaS DDoS OneNote Samsung Antivirus Content Filtering Blockchain Battery Television Humor HaaS Disaster Compliance Data Loss Streaming Media Employer-Employee Relationship Apple Marketing Automobile Google Docs Network WiFi Sports Going Green Tech Support Saving Time Data Protection Bandwidth Cleaning Hacker Office Solid State Drive eWaste Internet Exlporer Computer Care Phone System Redundancy Commerce Legal Encryption Users iPhone Cortana Mobile Computing Project Management Transportation Computer Accessories Text Messaging Worker Commute Lifestyle Business Intelligence stock Touchscreen Mobile Device Big Data Charger Outlook MSP Managing Stress Word Legislation Managed IT Service tweet iOS Books Wireless Charging Scalability intranet Education Windows Ink calculator Hiring/Firing Vendor Management Comparison Laptop Router Twitter Uninterrupted Power Supply Computer Fan control Evernote How To Regulation IT budget Google Maps Benefits Specifications Touchpad Screen Mirroring WSJ Dark Web Exchange Unified Threat Management Networking Reputation Maintenance Sync Advertising Software as a Service Distributed Denial of Service Meetings altivista Training Entertainment Sales Cast Emails SBS Upgrades Electronic Medical Records Workers Device Security Adobe Identities Point of Sale Data storage Settings compaq Company Culture HIPAA Retail Black Market Licensing Wearable Technology Chromecast WannaCry Consultant Updates Administration Devices Smart Technology hp Webinar Value Conferencing Avoid Downtime HBO Shadow IT Mobile domain Microsoft Word Colocation Spyware Hard Drives Document Management Microsoft Excel IT solutions Experience Gifts Files Professional Services Administrator remote Lithium-ion battery Fraud File Sharing Yahoo Windows 10s Video Games IT Management Virtual Reality Travel Running Cable Access Nanotechnology Server 2008 Relocation Edge Scam Storage Ali Rowghani Hard Disk Drive Music Credit Cards Trending WIndows Server 2008 Tablets Root Cause Analysis Ciminal Employer Employee Relationship PDF Analytics FAQ Patch Management Instant Messaging NFL Augmented Reality server installation dvd "cannot install required files" Keyboard Thank You Congratulations CrashOverride Safety Cache Monitors Emergency Remote Monitoring Worker

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...