Protect Your Business from a Cyber Attack!

Protect Your Business from a Cyber Attack!

In the past 5 hours, news has emerged the the Australian Government is under a Cyber Attack. They have urged businesses to protect themselves. However, how do you protect yourself if you do not know what to do? I have put together 5 key steps you can take to protect your business now.

Back up your Business Data

Every business collects data and uses data to conduct business. What would happen to your business if you could not access this data? Think if you cannot access the following: your website, your email or your database. The first thing that any business can do is to back up all their business data. This helps you in 2 ways:

1.     When there is an attack, and you are compromised, you can get your business back faster.

2.     You have a copy of data which your IT team can look for inconsistencies. 

You should back up your business data regularly. It is recommended you have 3 copies in case one copies is corrupt. The more data you collect, the more frequent your backups.

How do you know your Business has been hacked?

There are some key indicators that your business is being hacked. (Download Poster) These include things like login issues, slow network, strange account activity or files that may have been moved, deleted or names have changed.

Review your Response Plan

It is important that your team is ready to act if there is a cyber-attack.(Download Poster) For example, if you find that your online business is suddenly facing a surge in people trying to access your administration panel, do you know what to do? Your response plan should include actionable steps that include: Preparing for an attack, Identifying an Attack, Dealing with the Attack through containing it to eradication, identify how this attack happened, and finally recap with steps to prevent future attacks like this one.

Communicate

When attackers fail to access from the outside-in, their next attempt will be to prey on the weakest link. This is often done by sophisticated emails that target specific individuals, called spear phishing. Communicate with your staff that there is an attack and they must be vigilant about all emails. 

Understand your Vulnerabilities

Many businesses have several ‘unknowns.’ Make sure you know your ‘weakest link’ so that you can either fix it or develop a plan to deal with it. You can quickly understand your vulnerabilities by having a cyber risk assessment.


Ernest O. Darko-Mensah

MANAGING DIRECTOR OF SPEARHEAD NETWORKS

4 年

Great info shared . It’s a must read and a great tool towards advanced protection

Rob G.

Counter-Insider Threat Specialist

4 年

Interesting points made and Intel shared, but surely if you are supporting your infrastructure with implementing more control procedures with tech measures then you are protecting against bad actors or adversaries who already have access to your inner sanctum. There are many collecting methods used to evaluate security resilience, practices and procedures, and each method will give valuable information to the bad actor or adversary to help assist them towards breaching or compromise sensitive areas.

Sunday McDickson Samuel- SMS

PRACTICAL CYBERSECURITY: Keeping Organizations Off The News For The Wrong Reason- Cyberattacks!

4 年

Brenda V. While the 5 steps highlighted are a great place to start, notching them up with a practical security controls would be great as organisations seeks to frustrate, slow down, disrupt and irritate those cyber thugs.. In this regard I'll add the following. 1- Implement DMARC to conformance, dmarcian.com 2- Implement an ESG for your email infrastructures, Avanan.com 3- Implementing a comprehensive web applications security conveying protection for DDOS, BOT, Intrusion and web app attacks, baffinbaynetworks.com 4- Harden AD with a conditional access platform, Preempt.com 5- Implement a network segregation platform , zeronetworks.com 6- Implement a comprehensive endpoint security platform, Cynet.com

Fiona Feyt

Designing custom Laser merchandise from locally sourced and manufactured products.

4 年

Thanks. Great advice.

Kyle McDonald

Business Development Manager

4 年

Very good info. Thanks for sharing Brenda.

要查看或添加评论,请登录

社区洞察

其他会员也浏览了