10 Steps to Help Protect Your Business from Cyber Attacks

When it comes to cyber security, it's hard to know where to start. There’s a myriad of information out there and figuring out how to keep your network safe, train your employees or the key to creating a foolproof incident response plan can easily overwhelm anyone.

However, there are a few simple steps you can take to be more vigilant and harden your systems against malicious attacks, breaches and poor password etiquette. We’ve put together 10 steps to get you started.

Penetration Testing

Consider this step one in your cyber security protection plan. Also known as ethical hacking, it will identify vulnerabilities in a system or network that has existing security measures in place. Step two is taking measures to plug the gaps.
Network Security

Protects network files and directories from unauthorised access, system changes, misuse and hacking. It’s one of the most simple, yet important ways to minimise the risk of data theft.

Monitoring

Threat monitoring allows for continuous oversight of any vulnerabilities across your networks to stay on top of incoming threats. Cybercriminals take the path of least resistance, don’t leave a door open.

Home & Mobile Working

Security needs to be rethought in a remote and mobile-working world. Develop a policy and training program to ensure employees know what’s at risk. All devices used for work must include a secure baseline build to protect data both in transit and at rest.

Incident Management

This is a process of identifying, managing, recording and analysing security threats or incidents in real-time. Establish an incident response and disaster recovery plan. Always report an incident to the Privacy Commissioner and notify any affected customers.

Removable Media Rules

Set a company-wide policy to control access to all removable media. Ensure it limits media types, use and all removable devices are scanned for malware before importing into a corporate system.

User Education

Employees can make or break security. Produce user security policies covering acceptable and secure use of your organisation’s systems. Establish a training program with regular testing such as phishing attacks. Start easy with a session on passwords.

User Privileges

All users of your systems should only be provided with the privileges they need to do their job. Establish account management processes and limit the number of privileged accounts. Monitor user activity, control access and audit logs regularly.

Secure Configuration

When building and installing computers and network devices, secure configurations, like MFA, are put in place to reduce vulnerabilities. To maintain these, create a system inventory and define a base-line build for all ICT devices. Beware — misconfigurations are the most common gaps hackers look to exploit.

Malware Prevention

Malware is short for “malicious software”— nasty applications looking to do damage. Establish anti-malware defences such as endpoint detection, response software and application and website whitelisting. Always keep your network up-to-date.

Want your own copy of the 10 steps to take back to your business? Download a printable poster below.

DOWNLOAD YOUR POSTER

Are you ready to take the next step in your cyber security? Get in touch today to organise a free risk analsysis.

You can also learn about our new Secure Managed Services here.