4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

In February of 2016, President Barack Obama passed a Cybersecurity National Action Plan. The plan implemented near-term actions and developed a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, and maintain public safety. Taking action against cybersecurity now will assist with ensuring economic and national security, as well as empowering Americans to take better control of their digital security.

For a small business, it’s even more important to avoid becoming a cybercrime victim. Data loss, downtime, fines/restitution, and lost time and resources are just a few things that you might be forced to endure as a result of falling prey to a hacker. Here’s a list of actions that the FBI recommend you take to help protect your company from being a victim of ransomware.

  • Raise Awareness: Make sure employees are aware of ransomware and of their critical roles in protecting the organization’s network and data.
  • Updates and Patches: Patch operating system, software, and firmware on digital devices (which may be made easier through a centralized patch management system).
  • Auto Update Security Software: Ensure anti-virus and anti-malware solutions are set to automatically update and conduct regular scans.
  • Limit Super Users: Manage the use of privileged accounts—no users should be assigned administrative access unless absolutely needed, and only use administrator accounts when necessary.
  • Access Control: Configure access controls, including file, directory, and network share permissions appropriately. If users only need read-specific information, they don’t need write-access to those files or directories.
  • Filters and Application Control: Implement software restriction policies or other controls to prevent programs from executing from common ransomware locations (e.g., temporary folders supporting popular Internet browsers, compression/decompression programs).
  • Data Backup & Disaster Recovery Plan: Backup data regularly and verify the integrity of those backups regularly.
  • Multiple Storages: Make sure backups are not stored or connected to the computers and networks they are backing up.

Given the extreme measures that governments have taken to prevent cybercrime, it’s a safe bet that businesses of every size should follow suit. Would you like to keep on top of all the latest news and information from the FBI’s cyber security division? Visit: https://www.fbi.gov/investigate/cyber/news.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 22 January 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency IT Support Windows Innovation Disaster Recovery Business Continuity Hardware Workplace Tips VoIP Mobile Devices Computer User Tips Saving Money Miscellaneous Virtualization Windows 10 Upgrade Mobile Device Management Network Security Data Server Email Mobile Computing communications Alert Communication Save Money Network Microsoft Office Small Business Social Media Quick Tips Smartphone Smartphones BYOD Going Green Information Technology Mobile Office Apps Android Health Office Managed IT Services Outsourced IT Browser Gadgets Application Ransomware Operating System Chrome Tablet The Internet of Things Cybersecurity Avoiding Downtime WiFi Mobility Productivity Disaster Managed IT Holiday Firewall Data Backup Remote Computing History Unified Threat Management IT Solutions Best Practice Data Management Spam BDR Cybercrime Passwords Telephone Systems Search Data Recovery Risk Management Facebook Hacking Remote Monitoring Hard Drives Apple Saving Time Employer-Employee Relationship Vendor Management Marketing Budget Automation VPN Law Enforcement Office Tips iPhone Customer Relationship Management Big Data Content Filtering Phishing Password Proactive IT Money Hosted Solution Computers User Error Collaboration Phone System Recovery Wireless Technology Work/Life Balance Wearable Technology Maintenance PowerPoint Printer Antivirus Office 365 Virus USB Shortcut Social Analytics Encryption Gmail Router Government Telephony Bring Your Own Device Lithium-ion battery Vulnerability Humor Current Events Administration Trending Education Net Neutrality SaaS Audit HaaS Tech Support Business Intelligence Data Security Users Politics Outlook Personal Information Windows 8 Social Engineering App Wireless Cost Management Unsupported Software Intranet Google Drive Cloud Computing Bandwidth Private Cloud Printer Server Save Time Point of Sale Laptop IT COnsultant OneNote Data Protection Computer Repair Data Storage Two-factor Authentication Redundancy Managing Stress Excel Display Samsung Wi-Fi Augmented Reality Emergency Artificial Intelligence Social Networking Applications Paperless Office Travel hacker Update Fax Server Customer Service Biometrics Transportation Workplace Retail Virtual Reality Streaming Media Robot Meetings Computer Care Battery Uninterrupted Power Supply online currency Automobile IT Support End of Support Instant Messaging Emails Network Congestion HIPAA Windows 10 Entertainment Benefits Internet Exlporer DDoS Computer Accessories Help Desk Efficency Internet of Things Mouse Compliance Identity Theft Solid State Drive Flexibility Sports Regulations PDF Website Licensing Scalability Files Microsoft Excel Value Dark Web Cameras Screen Mirroring Safety Text Messaging OneDrive Chromecast Amazon User How To Co-managed IT Science File Sharing Upgrades Presentation Cast Virtual Desktop Administrator Bluetooth Best Available Hard Drive Training Windows 10s Nanotechnology Colocation IT Technicians systems Consultant Lifestyle The Blindside Of Ebay Access Computing SharePoint Uograde Images Tablets Company Culture Hard Disk Drive Black Market Root Cause Analysis hack Touchscreen HBO IT Security Teamwork NFL Cleaning best practices CrashOverride Experience Cortana Busines Continuity Near Field Communication IT Management Keyboard Avoid Downtime Networking Word data breach Settings Music Legislation Twitter IT consulting Wiring WIndows Server 2008 Hiring/Firing Human Resources Data storage Running Cable Information Windows Ink risk management Books Surge Protector Debate Television Reliable Computing Patch Management Smart Technology Video Games 3D Printing Google Maps Document Management Commerce Data Breach Advertising Bloatware Regulation Legal Touchpad Software as a Service Mobile Device Managed Security ISP Branding Sync Scam Distributed Denial of Service Nokia Data Loss iOS Managed IT Service Programming Blogging WIndows 7 Adobe Employer Employee Relationship Managed IT Services Operating Sysytem eWaste Storage Google Docs Inbound Marketing Computer Fan Worker Commute Electronic Medical Records IT service Devices Webinar IT Budget Credit Cards Domains Spyware Mobile IT solutions Reputation FAQ Professional Services Charger Youtube Microblogging Wireless Charging Buisness Sales Shadow IT Relocation Managed Service Provder WannaCry Tutorial Webinar Evernote Comparison Workers Specifications Updates Gift Giving Conferencing Microsoft Word Taxes Gifts Device Security Supercomputer