(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Essential Cybersecurity Tips From The FBI

In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet. The strategy is to make an immediate effort to empower citizens to protect their own privacy, while also maintaining public safety and national and economic security, as many of the most critical systems this nation utilizes are networked on the web.

For the average small business, it is more crucial than ever to avoid the pitfalls that lay on the internet. Victims of cybercrime deal with an endless number of issues, including drops in revenue, data loss, downtime, and fines/restitution if they are unable to keep their networks secure. Below are a number of line-items that the Federal Bureau of Investigation recommends to keep your data secure, and to avoid becoming a victim of the most pressing malware on the Internet today: ransomware.

  • Raise Awareness: Ensure that you make a point to make your staff cognizant of the threat of a ransomware infection.
  • Updates and Patches: Make sure to patch your operating systems, software, and firmware on all of your digital assets.
  • Auto Update Security Software: Lean on enterprise-level antivirus and anti-malware software to conduct regular scans and catch potential malware.
  • Limit Super Users: Ensure that you don’t just hand out administrator access to your mission-critical systems. Managing access is one of the best ways to keep untrustworthy entities out of your network.
  • Access Control: As stated above, access control is essential to ensure that you know who can and should be in parts of your network. If your users only need read-specific information, they don’t need write-access to files or directories, mitigating risk.
  • Filters and Application Control: Deploy software restrictions to keep programs from executing from location where ransomware may be found. This includes temporary folders found to support Internet browsers and compression/decompression programs.
  • Data Backup & Disaster Recovery Plan: Create data redundancy by having a comprehensive backup and recovery plan in place.
  • Multiple Storages: Ensure that each storage unit is stand-alone to avoid major problems with backups and other forms of storage.

Governments absolutely have to have a strategic plan on how to deal with cybercrime, and as a solid practice, businesses should follow suit. If you want to make sure your strategies are top-level, visit https://www.fbi.gov/investigate/cyber/news to see what the FBI is doing to protect their computing infrastructure. For more great security information, subscribe to our blog.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 19 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Efficiency Mobile Devices IT Support Business VoIP Miscellaneous IT Services Managed Service Provider Server Workplace Tips Business Continuity Innovation Data Upgrade Disaster Recovery Network Software Hardware Email Windows Save Money Saving Money Business Management Communication Computer Mobile Device Management Browser Smartphones User Tips Microsoft Office Network Security Virtualization Smartphone Managed IT Services Holiday Android Windows 10 WiFi Operating System Mobile Computing communications Hacking BYOD Social Media Computers IT Solutions Cybercrime Chrome Application Small Business Apple Outsourced IT Proactive IT Remote Monitoring Avoiding Downtime Passwords Office Marketing Budget Collaboration The Internet of Things Big Data Ransomware Alert Quick Tips Data Backup Automation Information Technology Going Green Remote Computing Mobility Health Bring Your Own Device VPN Managed IT Services Recovery spam Social Engineering Employer-Employee Relationship Managed IT Wireless Technology User Error Vendor Management iPhone Save Time Cybersecurity Gadgets Firewall Telephone Systems App Private Cloud Bandwidth Compliance Networking Mouse Redundancy Office 365 IT Support PowerPoint Website Excel Antivirus Phone System Office Tips Content Filtering Downtime History Tablet Gmail Lithium-ion battery Analytics Router Retail Memory Search Customer Relationship Management Intranet Phishing Vulnerability SaaS How To Artificial Intelligence Best Available Data Security People Safety Government Programming Network Congestion Meetings Trending HaaS Apps IT Consultant Cloud Computing Fax Server Law Enforcement Black Market Data Management Solid State Drive Humor Two-factor Authentication Internet of Things Saving Time Statistics Document Management Data Storage Risk Management Internet Exlporer Data storage Online Currency Word Windows 10 Biometrics Outlook Business Owner Printer Flexibility Money Hard Drives Current Events Facebook Administration Maintenance Data Recovery Entertainment Running Cable Physical Security DDoS Value Skype Unsupported Software BDR Unified Threat Management Robot Google Drive Public Cloud Mobile Office Environment Touchscreen LinkedIn Software Tips Virus Virtual Desktop IT service Human Resources Telephony Touchpad Relocation Hybrid Cloud Virtual Reality Debate Google Docs Computer Care Uninterrupted Power Supply Computer Accessories Training Domains Start Menu HIPAA Voice over Internet Protocol Audit IaaS Bloatware Spam Blocking Video Surveillance HBO Cleaning Cameras Customer Service Consultant Mobile Multi-Factor Security Screen Mirroring Entrepreneur Education Frequently Asked Questions Tech Support Printer Server Hacker Professional Services Computer Fan Lifestyle Cast Worker Commute Cost Management Piracy Tip of the week Shadow IT Applications User Wireless Files Science Tools FENG Data Protection Productivity Streaming Media Instant Messaging Company Culture Licensing Shortcut Windows 8.1 Update Samsung Windows Server 2008 Wi-Fi SharePoint Colocation Twitter Windows 8 Workers Business Intelligence Encryption Bluetooth Crowdfunding Windows 7 Sports Monitor Hosted Solution eWaste Computing Infrastructure Tablets Botnet OneNote Data Warehousing Notifications USB Regulations YouTube Print Server Reputation Wearable Technology End of Support Travel IT Management Windows Media Player Social Servers NarrowBand Work/Life Balance Customers Internet exploMicrosoft Net Neutrality Hiring/Firing Root Cause Analysis Computer Repair IT Plan Best Practice Social Networking WIndows 7 Flash Chromecast Patch Management Advertising Analyitcs Software as a Service Data loss Managing Stress Settings Sync Laptop Scam Distributed Denial of Service Update Charger Scalability Politics Transportation How to webinar Benefits PDF Loyalty Conferencing Keyboard Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Password Television Troubleshooting Comparison Electronic Medical Records Techology Public Computer Specifications Employer Employee Relationship Legal Data Breach Automobile Books Emails CrashOverride Mobile Device IBM Emergency Webinar Worker Users Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Netflix