4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

In February of 2016, President Barack Obama passed a Cybersecurity National Action Plan. The plan implemented near-term actions and developed a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, and maintain public safety. Taking action against cybersecurity now will assist with ensuring economic and national security, as well as empowering Americans to take better control of their digital security.

For a small business, it’s even more important to avoid becoming a cybercrime victim. Data loss, downtime, fines/restitution, and lost time and resources are just a few things that you might be forced to endure as a result of falling prey to a hacker. Here’s a list of actions that the FBI recommend you take to help protect your company from being a victim of ransomware.

  • Raise Awareness: Make sure employees are aware of ransomware and of their critical roles in protecting the organization’s network and data.
  • Updates and Patches: Patch operating system, software, and firmware on digital devices (which may be made easier through a centralized patch management system).
  • Auto Update Security Software: Ensure anti-virus and anti-malware solutions are set to automatically update and conduct regular scans.
  • Limit Super Users: Manage the use of privileged accounts—no users should be assigned administrative access unless absolutely needed, and only use administrator accounts when necessary.
  • Access Control: Configure access controls, including file, directory, and network share permissions appropriately. If users only need read-specific information, they don’t need write-access to those files or directories.
  • Filters and Application Control: Implement software restriction policies or other controls to prevent programs from executing from common ransomware locations (e.g., temporary folders supporting popular Internet browsers, compression/decompression programs).
  • Data Backup & Disaster Recovery Plan: Backup data regularly and verify the integrity of those backups regularly.
  • Multiple Storages: Make sure backups are not stored or connected to the computers and networks they are backing up.

Given the extreme measures that governments have taken to prevent cybercrime, it’s a safe bet that businesses of every size should follow suit. Would you like to keep on top of all the latest news and information from the FBI’s cyber security division? Visit: https://www.fbi.gov/investigate/cyber/news.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 September 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Best Practices Privacy Microsoft Internet Business Computing software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Malware IT Services Business Google Efficiency Windows Disaster Recovery Innovation IT Support Hardware Workplace Tips Business Continuity Saving Money Computer VoIP Virtualization User Tips Windows 10 Upgrade Miscellaneous Mobile Devices Mobile Device Management Data Server Mobile Computing Network Security Email Microsoft Office Communication Network Alert Save Money Quick Tips communications Going Green Mobile Office Social Media Information Technology Smartphones BYOD Office Smartphone Apps Small Business Health Android Browser Gadgets Outsourced IT Operating System Chrome Application Ransomware Disaster Tablet Productivity Managed IT Services Firewall Avoiding Downtime Remote Computing Unified Threat Management Mobility IT Solutions Risk Management Spam BDR WiFi Search Managed IT Cybercrime Holiday Passwords The Internet of Things Telephone Systems Facebook Budget Automation Hard Drives Saving Time Hacking History Remote Monitoring Best Practice Data Management Cybersecurity Vendor Management Employer-Employee Relationship Phone System Big Data Recovery Office Tips Proactive IT Customer Relationship Management Collaboration Phishing Apple Password Hosted Solution Wireless Technology VPN Computers Law Enforcement Marketing Office 365 Printer USB Humor Content Filtering Administration Analytics Wearable Technology Gmail Router Money iPhone Maintenance PowerPoint Antivirus User Error Virus Shortcut Social Lithium-ion battery Current Events Bring Your Own Device Telephony Point of Sale IT COnsultant Tech Support Computer Repair Outlook Encryption Wireless Government App HaaS Unsupported Software Cost Management Google Drive Cloud Computing Business Intelligence Intranet Data Recovery Users Save Time Bandwidth Printer Server Windows 8 Laptop OneNote Social Engineering Work/Life Balance Education Trending Net Neutrality Data Backup Private Cloud Benefits Emergency Help Desk DDoS Computer Accessories Applications Augmented Reality Paperless Office Mouse Compliance hacker Personal Information Transportation Fax Server Two-factor Authentication Managing Stress Workplace Battery Robot SaaS Excel Computer Care Streaming Media IT Support Audit Automobile Uninterrupted Power Supply End of Support Social Networking online currency Travel Vulnerability Internet Exlporer Update Customer Service Biometrics Internet of Things Retail Identity Theft Virtual Reality Data Protection Solid State Drive Efficency Data Storage Meetings Flexibility Emails Instant Messaging Network Congestion Samsung HIPAA Entertainment Wi-Fi Display Artificial Intelligence Amazon Nanotechnology Data Security Administrator Co-managed IT Training Consultant Tablets Colocation Hard Disk Drive Branding The Blindside Of Root Cause Analysis Black Market Nokia HBO Access Distributed Denial of Service Company Culture Touchscreen Politics NFL Ebay best practices WIndows 7 IT Security Computing CrashOverride IT Management eWaste Cleaning Inbound Marketing Regulations Experience Word data breach Keyboard Avoid Downtime Settings Value WIndows Server 2008 Cameras Music risk management User Hiring/Firing Patch Management Data storage Science Virtual Desktop Presentation Books Windows 10 Twitter Commerce Hard Drive Bluetooth Best Available Smart Technology Video Games Document Management Regulation IT Technicians Surge Protector Data Breach Advertising Television Images SharePoint Legal Uograde 3D Printing Sync Touchpad Mobile Device Managed Security iOS Managed IT Service Teamwork Scam Busines Continuity ISP Adobe Managed IT Services Networking Near Field Communication Computer Fan Sports Employer Employee Relationship Worker Commute Programming Licensing Operating Sysytem Blogging Human Resources IT consulting PDF Dark Web Wiring Information Screen Mirroring Files Running Cable Scalability Website Reliable Computing Safety Text Messaging Debate Cast Chromecast How To OneDrive Windows 10s Bloatware Upgrades Lifestyle Shadow IT Storage Relocation IT service Windows Ink Tutorial Domains Microblogging Youtube Buisness Sales Managed Service Provder Gift Giving Taxes Webinar Webinar Supercomputer Electronic Medical Records Mobile IT solutions IT Budget Professional Services Reputation