In the past two months, the news has been littered with reports of cyberattacks including attacks on: The Department of Homeland Security, Mitsubishi, and LifeLabs, to name a few.
Five Steps to reduce the chance that your business will be a target of a cyberattack:
- Be careful what you click on. Watch for emails that seem out-of-place, like the email from your boss that asks you to run an errand and pick up gift cards as they are in a meeting. Or, that email that seems too good to be true (it probably is) and contains a ransomware infection. In our busy lives, remember to think before clicking.
- Use strong security software. Security software should be installed on every device that you use to connect to the internet. Whether accessing email or the internet your computer needs to be protected. Using a strong software package that includes anti-malware, anti-spam, anti-ransomware, and includes a firewall, is strongly recommended.
- Turn off any remote access services that are not needed. Most computers include the option to use RDP (Remote Desktop protocol) and if this service is not being used, this needs to be turned off. Adjustment to Firewalls are also needed, to disable any ports or protocols. If you are not sure how to do this, please contact your trusted IT provider.
- Data Backups. Make sure that your data is being backed up on a daily basis. Some backup solutions will perform their backup in real time, every 15 minutes, or once daily. However it does not matter how often you back up your data (depending on your business needs), but make sure that you have a backup. It should be stored off-site and needs to be checked on a regular basis.
- If you think you’ve been hacked, call your trusted provider immediately. Fast response to a data breach is key to a resolution. If you have been hacked, remove all computers from the network/internet immediately. Some infections will take effect when you restart your computer, so it may not be in your best interest to shut down your computer. A trusted Incident Response, Computer Forensics, and IT Provider, such as Elijah, can direct you on the steps you should take.
Founded in 2003, ELIJAH is a multi-award-winning leader in providing expert digital forensic, data security solutions, and managed IT. ELIJAH is owned and managed by former litigation partners and is an efficient boutique digital forensic, cybersecurity and IT solutions provider that makes clients’ lives easier through effective communication and white glove service. For additional information, please visit https://www.elijaht.com or call 866-354-5240.