Small Business Cybersecurity Toolkit- Part 2 of 2

Your Sensitive Data

  • Know what data resides on the network and where and maintain consistent inventories of all sensitive and/or critical information.
  • Create a standard procedure of regular automated backups and design key system redundancy.
  • Know the methods that protect the data including physical security, offline copies, and encryption.
  • Enhance the system with malware protection.
  • Maintain constant updates on all security software.
  • Monitor and manage the status of the network and any peripheral components including host and device, user activities, and data-at-rest and in-transit.

Response to Compromise

  • Have a relationship with a professional cybersecurity company to assist in the development of risk analysis, response to an incident, and disaster recovery plan in place. The plan must outline all responsibilities, contact levels, and roles and be consistently tested.
  • Have an emergency contact list of all individuals and organizations to contact for help including vendors, outside partners, law enforcement, industry responders.
  • Identify which systems require priority recovery to assist in business impact.
  • Create an internal reporting structure for detecting, reporting, and communicating to reduce any attack crisis.
  • Have actions ready to put in place in-house to limit or contain any cyberattack impact.

The Order of Bringing System Back Online

--

--

--

CEO of Da Vinci Forensics, a Cyber Security Company. #Cybercrime, #DigitalForensics #Marketing #Digital #Marketing #Risk #Management #Strategy #lifelessons #

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

My Bitcoin Saga: Getting phished and losing everything

Supernet Ltd obtains SBP contract worth Rs100mn

Download Vulnerability Review Report 2018 — Top Desktop Apps

The Orchid Token

{UPDATE} Thiên Hạ Ngũ Tuyệt Hack Free Resources Generator

Advisory: Wormable Windows HTTP Bug

The Future of Sports: Mariano Nunez of Onapsis On The New Emerging Technologies That Are Disrupting…

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Sharon @ Da Vinci Cybersecurity

Sharon @ Da Vinci Cybersecurity

CEO of Da Vinci Forensics, a Cyber Security Company. #Cybercrime, #DigitalForensics #Marketing #Digital #Marketing #Risk #Management #Strategy #lifelessons #

More from Medium

Cyber Security Vendors Need to Move Past FUD: Here’s Why and How

Automated blog posts, with blogger.com, Node-RED and Miniflux

Security Marketing and Sales 2: Sales

A year in the life of an AWS Ambassador