All Posts Tagged: cybersecurity

7 ways to spruce up your cybersecurity practices

David Pollino
Security

It’s not surprising that cyberattacks may be among the greatest threats to companies in 2018. Last year, we saw a large number of high-profile cyberattacks including Equifax, Uber and the now infamous WannaCry ransomware attack. Regardless of size or sector, all organizations may be vulnerable.

Mature, spry businessman sitting and working on the laptop that's in his lap.A new report, “Cyber Readiness” by insurance and underwriting firm Hiscox, has found 73% of organizations have major shortcomings in their readiness to protect against cyberattacks. To protect your business, here are seven ways you can “spring clean” your businesses’ cybersecurity:

1. Safeguard your intellectual property. Intellectual property is vital to many businesses. Product blueprints and trade secrets are essentially the lifeblood of the company. Screen employees and vendors, as well as securing networks, computers and equipment against intrusion from malware and spyware, malicious software that can disrupt devices and networks or capture confidential data and send it to hackers.

2. Patch your systems. Install anti-virus protection on every computer and device on your network.

3. Educate your workforce. Teach your employees to recognize, avoid and report suspicious emails containing attachments or hyperlinks, common signs of phishing, in which hackers use electronic channels to steal sensitive information.

4. Update your data policies. Ensure your software and operating systems are current.

5. Scan for vulnerabilities. To ensure no unauthorized code has been introduced to your company’s network, run a vulnerability scan against approved applications. If any software is vulnerable, you should get your IT department to update and patch immediately.

6. Maintain a separate administrator account. Using an administrator account with a unique password so that if an IT administrator’s primary email or passwords are compromised, hackers will still not have administrative rights to gain control of servers and networks.

7. Create a response place. Develop a plan for responding to cyberattacks. If your business becomes the target of a cyberattack involving unauthorized financial transactions, for example, promptly contact your financial institution and notify federal law enforcement of the incident. Implement verification processes as an extra layer of security for approving outgoing funds transfers or for changes to vendor payment instructions.

Companies can help mitigate common cybersecurity threats by adopting simple measures that can go a long way to protect your organization.

Read More ›

Cybersecurity: When speed is everything

Eileen Dignen
Cash Management
Collage showing hands of a clock near noon, with euros and graph notations in the background.

Even the best-designed cybersecurity policy is no silver bullet for total protection of corporate data.

Read More ›

Impacted by the Equifax breach? Five steps to help protect yourself

David Pollino
Security
Man looking at credit card and iPad

Our Deputy Chief Security Officer shares tips to protect your personal information and financial accounts in the wake of the Equifax breach.

Read More ›

Business safety lessons from Target, Home Depot hacks

David Pollino
Security
View over the shoulder of a male Home Depot worker with computer and paperwork in the aisle of a large store.

All it takes is one device to become infected or infiltrated by hackers to expose a business’s entire network and put its customers at risk.

Read More ›

4 tips to help avoid prepaid debit card scams

David Pollino
Security
Female small biz owner taking a customer

Beware of the latest phone scam, this one stealing money from businesses and consumers via prepaid debit cards.

Read More ›