(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Essential Cybersecurity Tips From The FBI

Essential Cybersecurity Tips From The FBI

In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet. The strategy is to make an immediate effort to empower citizens to protect their own privacy, while also maintaining public safety and national and economic security, as many of the most critical systems this nation utilizes are networked on the web.

For the average small business, it is more crucial than ever to avoid the pitfalls that lay on the internet. Victims of cybercrime deal with an endless number of issues, including drops in revenue, data loss, downtime, and fines/restitution if they are unable to keep their networks secure. Below are a number of line-items that the Federal Bureau of Investigation recommends to keep your data secure, and to avoid becoming a victim of the most pressing malware on the Internet today: ransomware.

  • Raise Awareness: Ensure that you make a point to make your staff cognizant of the threat of a ransomware infection.
  • Updates and Patches: Make sure to patch your operating systems, software, and firmware on all of your digital assets.
  • Auto Update Security Software: Lean on enterprise-level antivirus and anti-malware software to conduct regular scans and catch potential malware.
  • Limit Super Users: Ensure that you don’t just hand out administrator access to your mission-critical systems. Managing access is one of the best ways to keep untrustworthy entities out of your network.
  • Access Control: As stated above, access control is essential to ensure that you know who can and should be in parts of your network. If your users only need read-specific information, they don’t need write-access to files or directories, mitigating risk.
  • Filters and Application Control: Deploy software restrictions to keep programs from executing from location where ransomware may be found. This includes temporary folders found to support Internet browsers and compression/decompression programs.
  • Data Backup & Disaster Recovery Plan: Create data redundancy by having a comprehensive backup and recovery plan in place.
  • Multiple Storages: Ensure that each storage unit is stand-alone to avoid major problems with backups and other forms of storage.

Governments absolutely have to have a strategic plan on how to deal with cybercrime, and as a solid practice, businesses should follow suit. If you want to make sure your strategies are top-level, visit https://www.fbi.gov/investigate/cyber/news to see what the FBI is doing to protect their computing infrastructure. For more great security information, subscribe to our blog.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 25 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Hosted Solutions Productivity Microsoft Internet Malware Backup Google Mobile Devices Efficiency VoIP Business IT Support Email IT Services Network Security Miscellaneous Managed Service Provider Innovation Server Data Business Continuity Network Disaster Recovery Workplace Tips Software Windows Upgrade Business Management Communication Saving Money Hardware Mobile Device Management Smartphone Browser Managed IT Services Virtualization Computer Android Save Money communications Smartphones Data Backup User Tips Microsoft Office Cybercrime Holiday BYOD WiFi Computers Outsourced IT Windows 10 Small Business Social Media Cloud Computing Remote Monitoring Data Recovery Operating System Hacking Mobile Computing Chrome Big Data Ransomware Alert Automation Apple Proactive IT Avoiding Downtime Collaboration Managed IT Services VPN Internet of Things IT Solutions Application Quick Tips BDR Employer-Employee Relationship Information Technology Office Budget Passwords Marketing The Internet of Things Social Engineering Gadgets Bandwidth Managed IT Tech Term Health Mobility Bring Your Own Device Going Green Remote Computing Cybersecurity Recovery spam Telephone Systems Gmail iPhone How To Data Protection Private Cloud Business Intelligence Compliance Router IT Support Redundancy Wireless Technology User Error Artificial Intelligence Two-factor Authentication Website Vulnerability Data Security Save Time Firewall Vendor Management App Tablet Lithium-ion battery Value Antivirus Phishing Memory Retail Search Analytics Networking Mouse Law Enforcement Productivity Office 365 Data Management Windows 10 PowerPoint Apps Excel Identity Theft Phone System Money Office Tips Content Filtering Downtime Document Management Risk Management History Entertainment Running Cable Public Cloud Printer Physical Security DDoS Infrastructure Robot Unified Threat Management Skype Data Storage Mobile Office Google Drive Current Events Environment HIPAA Word Customer Relationship Management Comparison Maintenance Human Resources SaaS Training Best Available People Safety Programming Government Cleaning Network Congestion Trending Meetings Solid State Drive IT Management Intranet HaaS Applications Fax Server Black Market Smart Tech IT Plan CES Humor Workers Unsupported Software Statistics Streaming Media Business Owner Internet Exlporer Update OneNote Data storage IT Consultant Biometrics Encryption Outlook eWaste Mobile Device Work/Life Balance Saving Time Flexibility Credit Cards Hard Drives Online Currency Facebook Administration Data loss Google Apps Social Networking Professional Services Hiring/Firing Best Practice Chromecast Scam Strategy WIndows 7 Lifestyle Cast Tip of the week Storage Charger Authentication Amazon Analyitcs Tools Laptop Analysis Settings Hybrid Cloud Managing Stress Print Server Windows Server 2008 Addiction Computer Care Nanotechnology Distributed Denial of Service Amazon Web Services Password Manager Virtual Desktop Virus LinkedIn Spam Blocking Touchpad Accountants IT service PDF Virtual Reality Windows 7 Debate Cache Relocation Connectivity Net Neutrality Online Shopping Computer Repair Uninterrupted Power Supply Keyboard Business Mangement Computer Accessories Botnet Domains Specifications Data Warehousing Bloatware Regulations Wireless Internet Devices IaaS Evernote Recycling Customer Service Cameras Travel Video Surveillance Computer Fan IoT Consultant Millennials Entrepreneur Servers Education Touchscreen Wireless Charging Tech Support Criminal Files Printer Server FENG Password Workforce Hacker Fiber-Optic Cost Management Worker Commute Flash Piracy Wi-Fi Shadow IT Colocation Software as a Service Electronic Medical Records Insurance Wireless User Telecommuting Science Cables Instant Messaging Sync Licensing Hosted Solution Content Management Shortcut Computing Infrastructure Samsung Twitter Software Tips Practices SharePoint Legal Remote Work Windows 8 Unified Communications Telephony Crowdfunding Sports Blockchain End of Support Google Docs Bluetooth Monitor Hosted Computing Tablets Theft Start Menu Notifications YouTube Staff Internet exploMicrosoft Voice over Internet Protocol USB Audit HBO Root Cause Analysis Thought Leadership Reputation Inventory Company Culture Wearable Technology Cortana Windows 8.1 Update Social Windows Media Player Mobile NarrowBand Patch Management Digital Signature Advertising Multi-Factor Security Screen Mirroring Frequently Asked Questions Content Filter Customers Access Control Fraud Audiobook Knowledge Netflix Scalability Politics Transportation How to webinar Benefits Users Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Wire Assessment Music Television Troubleshooting Techology Public Computer Employer Employee Relationship Data Breach Automobile Emails Books CrashOverride IBM Webinar Emergency Worker Content Supercomputer IT solutions Rootkit Video Games