4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

In February of 2016, President Barack Obama passed a Cybersecurity National Action Plan. The plan implemented near-term actions and developed a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, and maintain public safety. Taking action against cybersecurity now will assist with ensuring economic and national security, as well as empowering Americans to take better control of their digital security.

For a small business, it’s even more important to avoid becoming a cybercrime victim. Data loss, downtime, fines/restitution, and lost time and resources are just a few things that you might be forced to endure as a result of falling prey to a hacker. Here’s a list of actions that the FBI recommend you take to help protect your company from being a victim of ransomware.

  • Raise Awareness: Make sure employees are aware of ransomware and of their critical roles in protecting the organization’s network and data.
  • Updates and Patches: Patch operating system, software, and firmware on digital devices (which may be made easier through a centralized patch management system).
  • Auto Update Security Software: Ensure anti-virus and anti-malware solutions are set to automatically update and conduct regular scans.
  • Limit Super Users: Manage the use of privileged accounts—no users should be assigned administrative access unless absolutely needed, and only use administrator accounts when necessary.
  • Access Control: Configure access controls, including file, directory, and network share permissions appropriately. If users only need read-specific information, they don’t need write-access to those files or directories.
  • Filters and Application Control: Implement software restriction policies or other controls to prevent programs from executing from common ransomware locations (e.g., temporary folders supporting popular Internet browsers, compression/decompression programs).
  • Data Backup & Disaster Recovery Plan: Backup data regularly and verify the integrity of those backups regularly.
  • Multiple Storages: Make sure backups are not stored or connected to the computers and networks they are backing up.

Given the extreme measures that governments have taken to prevent cybercrime, it’s a safe bet that businesses of every size should follow suit. Would you like to keep on top of all the latest news and information from the FBI’s cyber security division? Visit: https://www.fbi.gov/investigate/cyber/news.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 19 November 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Backup Hackers Productivity Hosted Solutions Business Management Managed Service Provider Malware Google IT Services Business Efficiency Windows Disaster Recovery IT Support Innovation Business Continuity Hardware VoIP Workplace Tips User Tips Saving Money Computer Miscellaneous Virtualization Upgrade Windows 10 Mobile Devices Mobile Device Management Data Network Security Server Mobile Computing Alert Email Communication Network Save Money Microsoft Office Smartphone Quick Tips Small Business communications Smartphones BYOD Going Green Mobile Office Information Technology Social Media Apps Health Android Office Browser Operating System Gadgets Application Chrome Ransomware Managed IT Services Outsourced IT Disaster Mobility Tablet Holiday WiFi Firewall Productivity Avoiding Downtime Managed IT Unified Threat Management IT Solutions Cybersecurity Passwords Spam BDR Best Practice Data Management Risk Management Search Cybercrime Telephone Systems The Internet of Things Remote Computing Automation Hard Drives Vendor Management Saving Time Hacking Remote Monitoring History VPN Employer-Employee Relationship Budget Apple Facebook Big Data Content Filtering Law Enforcement Marketing Office Tips Proactive IT Data Backup User Error Phishing Collaboration Password iPhone Money Customer Relationship Management Hosted Solution Computers Wireless Technology Recovery Phone System Data Recovery Printer USB Bring Your Own Device Work/Life Balance Analytics Encryption Router Gmail Office 365 Antivirus Government Shortcut Humor Social Administration Lithium-ion battery Wearable Technology Maintenance PowerPoint Virus Telephony Current Events Vulnerability Tech Support Outlook SaaS Audit HaaS Point of Sale App IT COnsultant Business Intelligence Cost Management Politics Data Security Personal Information Computer Repair Intranet Bandwidth Printer Server Laptop Wireless Social Engineering Unsupported Software OneNote Cloud Computing Google Drive Users Trending Education Net Neutrality Save Time Private Cloud Windows 8 Data Protection Compliance Flexibility Augmented Reality Sports Mouse Paperless Office Two-factor Authentication Data Storage Managing Stress Fax Server Excel Samsung Network Congestion Workplace Wi-Fi Artificial Intelligence Emergency Streaming Media Help Desk Applications Uninterrupted Power Supply Travel online currency hacker Customer Service Transportation Update Biometrics Retail Virtual Reality Computer Care Battery Robot Meetings Efficency Automobile Social Networking End of Support Instant Messaging Emails IT Support HIPAA Windows 10 Internet Exlporer Entertainment Benefits Display Internet of Things DDoS Computer Accessories Identity Theft Solid State Drive Employer Employee Relationship Data Loss iOS Distributed Denial of Service Worker Commute Managed IT Service Operating Sysytem PDF Managed IT Services Lifestyle WIndows 7 Wiring Adobe Google Docs Inbound Marketing Ebay Scalability Computer Fan Files eWaste Information Storage Regulations Computing Text Messaging Debate Safety Licensing Microsoft Excel Value How To Dark Web Chromecast Upgrades Cameras Screen Mirroring User Science Training File Sharing Administrator Virtual Desktop Consultant Presentation Cast Colocation Windows 10s Bluetooth Best Available The Blindside Of Company Culture systems Black Market Nanotechnology Twitter Access IT Technicians Nokia Touchscreen Tablets Hard Disk Drive Surge Protector SharePoint IT Security Cleaning hack Root Cause Analysis Television 3D Printing Experience HBO NFL Avoid Downtime best practices Teamwork Keyboard Cortana Busines Continuity CrashOverride Networking Near Field Communication Music IT Management Word data breach ISP Hiring/Firing Legislation Settings Data storage Human Resources IT consulting Books WIndows Server 2008 Windows Ink Blogging Video Games risk management Running Cable Programming Smart Technology Hard Drive Document Management Reliable Computing Data Breach Patch Management Advertising Images Google Maps Website Legal Uograde Bloatware Mobile Device Commerce Touchpad Managed Security Regulation Scam Software as a Service OneDrive Amazon Branding Sync Co-managed IT Supercomputer Electronic Medical Records IT Budget Webinar IT service Reputation IT solutions Domains Mobile Tutorial Professional Services Shadow IT Buisness Relocation Gift Giving Comparison Microblogging Youtube Specifications Sales Taxes Managed Service Provder Webinar