National Cybersecurity Awareness Month (NCSAM) is over but cybersecurity best practices don’t end when October ends. ICYMI, we’ve prepared a comprehensive infographic pulling together all of our clues, available for download here.
Here’s a final summary of all of our tips; thanks again for following along.
Clue 1: When the auditor knocks, have strong documentation and proper processes in place.
Clue 2: Patch. AV. Backup. Proactive, daily cyberhygiene is your first defense against foul cyberdeeds.
38 days: The average amount of time to patch a vulnerability1
Clue 3: Employees and contractors can leave with sinister motives. Plan ahead for when they’re gone.
Clue 4: Don’t let imposters change the locks. Verify identities before a password reset.
34% of data breaches involved insiders2
Clue 5: When it comes to ransomware, you either need good backup or a new client. The choice is yours.
Clue 6: Preventing email threats doesn’t stop at the inbox. Disable links, block bad web domains, and segment networks to contain damage.
55% of emails received are spam3
Clue 7: Take a risk-based approach to help balance security and convenience.
Clue 8: Policy and training matter, but practice is what makes perfect.
Clue 9: Today’s compliance laws are only the beginning—expect regulations to get tighter in the future.
Clue 10: Compliant doesn’t automatically mean secure. Focus on a robust, complete security program to stay safe.
You can read all the posts here.
1. “It Takes an Average 38 Days to Patch a Vulnerability,” Dark Reading. darkreading.com/cloud/it-takes-an-average-38-days-to-patch-a-vulnerability/d/d-id/1332638 (Accessed October 2019).
2. “2019 Data Breach Investigations Report: Executive Summary,” Verizon. enterprise.verizon.com/resources/executivebriefs/2019-dbir-executive-brief.pdf (Accessed October 2019).
3. “ISTR: Internet Security Threat Report,” Symantec. symantec.com/security-center/threat-report (Accessed October 2019).
Get the latest MSP tips, tricks, and ideas sent to your inbox each week.