MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

In February of 2016, President Barack Obama passed a Cybersecurity National Action Plan. The plan implemented near-term actions and developed a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, and maintain public safety. Taking action against cybersecurity now will assist with ensuring economic and national security, as well as empowering Americans to take better control of their digital security.

For a small business, it’s even more important to avoid becoming a cybercrime victim. Data loss, downtime, fines/restitution, and lost time and resources are just a few things that you might be forced to endure as a result of falling prey to a hacker. Here’s a list of actions that the FBI recommend you take to help protect your company from being a victim of ransomware.

  • Raise Awareness: Make sure employees are aware of ransomware and of their critical roles in protecting the organization’s network and data.
  • Updates and Patches: Patch operating system, software, and firmware on digital devices (which may be made easier through a centralized patch management system).
  • Auto Update Security Software: Ensure anti-virus and anti-malware solutions are set to automatically update and conduct regular scans.
  • Limit Super Users: Manage the use of privileged accounts—no users should be assigned administrative access unless absolutely needed, and only use administrator accounts when necessary.
  • Access Control: Configure access controls, including file, directory, and network share permissions appropriately. If users only need read-specific information, they don’t need write-access to those files or directories.
  • Filters and Application Control: Implement software restriction policies or other controls to prevent programs from executing from common ransomware locations (e.g., temporary folders supporting popular Internet browsers, compression/decompression programs).
  • Data Backup & Disaster Recovery Plan: Backup data regularly and verify the integrity of those backups regularly.
  • Multiple Storages: Make sure backups are not stored or connected to the computers and networks they are backing up.

Given the extreme measures that governments have taken to prevent cybercrime, it’s a safe bet that businesses of every size should follow suit. Would you like to keep on top of all the latest news and information from the FBI’s cyber security division? Visit: https://www.fbi.gov/investigate/cyber/news.

e-max.it: your social media marketing partner
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 22 September 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Business Computing Privacy Best Practices Hackers Malware Hosted Solutions Backup Software Internet Network Security Disaster Recovery Computer google Productivity Business Continuity Managed IT Services Business Microsoft Windows 10 IT Services IT Support VoIP Innovation User Tips Outsourced IT Hardware Mobile Devices Business Management communications Productivity Windows Mobility Efficiency Ransomware Email Save Money Cybercrime Saving Money Mobile Device Management Managed IT Telephone Systems Server Smartphone Law Enforcement Operating System Hosted Solution Quick Tips Android Virtualization Apps Chrome Information Technology Recovery Cybersecurity Passwords browser Microsoft Office BYOD Password Small Business Data BDR Social upgrade Wireless Communication Unsupported Software Budget VPN Facebook Hacking Avoiding Downtime Office 365 Health Miscellaneous Managed Service Provider Money Computers USB Proactive IT Save Time search Social Media App Risk Management Smartphones Cloud Computing Data Management Government Shortcut Work/Life Balance Data Backup Wi-Fi Firewall Application Gadgets Current Events Google Drive Workplace Tips Automation Telephony Alert Office tips Applications Private Cloud History End of Support Remote Computing Saving Time Data Recovery WiFi Cleaning Office Phone System Best Practice Going Green Computer Care Bandwidth Internet of Things Spam Phishing The Internet of Things Users Humor Disaster Identity Theft Managed IT Services Data Storage Employer-Employee Relationship Flexibility Network Cost Management Gmail Hacker Solid State Drive Internet Exlporer Wireless Technology Update Antivirus Samsung IT solutions Audit Battery HaaS DDoS Holiday Mobile Computing Compliance Personal Information Transportation IT Support Television Social Engineering Automobile Robot Streaming Media Tablets Wearable Technology Root Cause Analysis Document Management hp Experience Patch Management Windows 10 Laptop Uninterrupted Power Supply NFL Augmented Reality domain Touchscreen Video Games Business Intelligence Outlook Vulnerability Virtual Reality Touchpad Word Scam remote Reputation Yahoo Music Advertising Legal eWaste Managed IT Service Excel iOS Encryption Running Cable Employer Employee Relationship Server 2008 Ali Rowghani Analytics Data storage Trending Regulation Keyboard Computer Fan Instant Messaging Administration Artificial Intelligence Chromecast User Error Computer Accessories OneNote Worker Commute Screen Mirroring Big Data Data Breach Mobile Device Sports Sync Dark Web Managing Stress Colocation Meetings server installation dvd "cannot install required files" Cast stock Books Emails Hard Drives Scalability Tech Support Files Adobe Hiring/Firing Education Router Administrator Lithium-ion battery Vendor Management Settings SaaS Data Security tweet Marketing How To Licensing Benefits Relocation Access calculator Unified Threat Management HBO Twitter Content Filtering Webinar Mobile control Entertainment iPhone Training Upgrades Data Protection WSJ Electronic Medical Records IT solutions PDF Professional Services Collaboration Exchange Point of Sale HIPAA Distributed Denial of Service Company Culture altivista Consultant IT Management Windows 10s Text Messaging Black Market Travel Smart Technology Nanotechnology SBS compaq Politics Avoid Downtime Value Commerce Two-factor Authentication WIndows Server 2008 Apple Hard Disk Drive Shadow IT Worker Windows Ink CrashOverride Thank You Congratulations WannaCry Cache Monitors Remote Monitoring Safety Emergency

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...