(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Essential Cybersecurity Tips From The FBI

Essential Cybersecurity Tips From The FBI

In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet. The strategy is to make an immediate effort to empower citizens to protect their own privacy, while also maintaining public safety and national and economic security, as many of the most critical systems this nation utilizes are networked on the web.

For the average small business, it is more crucial than ever to avoid the pitfalls that lay on the internet. Victims of cybercrime deal with an endless number of issues, including drops in revenue, data loss, downtime, and fines/restitution if they are unable to keep their networks secure. Below are a number of line-items that the Federal Bureau of Investigation recommends to keep your data secure, and to avoid becoming a victim of the most pressing malware on the Internet today: ransomware.

  • Raise Awareness: Ensure that you make a point to make your staff cognizant of the threat of a ransomware infection.
  • Updates and Patches: Make sure to patch your operating systems, software, and firmware on all of your digital assets.
  • Auto Update Security Software: Lean on enterprise-level antivirus and anti-malware software to conduct regular scans and catch potential malware.
  • Limit Super Users: Ensure that you don’t just hand out administrator access to your mission-critical systems. Managing access is one of the best ways to keep untrustworthy entities out of your network.
  • Access Control: As stated above, access control is essential to ensure that you know who can and should be in parts of your network. If your users only need read-specific information, they don’t need write-access to files or directories, mitigating risk.
  • Filters and Application Control: Deploy software restrictions to keep programs from executing from location where ransomware may be found. This includes temporary folders found to support Internet browsers and compression/decompression programs.
  • Data Backup & Disaster Recovery Plan: Create data redundancy by having a comprehensive backup and recovery plan in place.
  • Multiple Storages: Ensure that each storage unit is stand-alone to avoid major problems with backups and other forms of storage.

Governments absolutely have to have a strategic plan on how to deal with cybercrime, and as a solid practice, businesses should follow suit. If you want to make sure your strategies are top-level, visit https://www.fbi.gov/investigate/cyber/news to see what the FBI is doing to protect their computing infrastructure. For more great security information, subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Mobile Devices Efficiency VoIP Business IT Support Managed Service Provider Email Miscellaneous IT Services Server Workplace Tips Disaster Recovery Business Continuity Network Innovation Data Windows Upgrade Hardware Business Management Software Saving Money Network Security Communication Computer Save Money Android Mobile Device Management Smartphones User Tips Microsoft Office communications Virtualization Managed IT Services Smartphone Browser Holiday Outsourced IT Windows 10 WiFi Hacking Chrome Small Business BYOD Social Media Operating System Mobile Computing Computers Data Backup IT Solutions Cybercrime Alert Application Apple Proactive IT Remote Monitoring Avoiding Downtime The Internet of Things Social Engineering Big Data Quick Tips Employer-Employee Relationship Automation Information Technology Passwords Managed IT Services Office Marketing Budget Ransomware Collaboration VPN Bring Your Own Device Data Recovery Telephone Systems spam Gadgets Going Green Remote Computing Health Recovery Mobility Cybersecurity App Vendor Management BDR iPhone Save Time Firewall How To Managed IT Cloud Computing Bandwidth Compliance Two-factor Authentication Wireless Technology User Error Risk Management PowerPoint Gmail Lithium-ion battery Website Excel Phone System Antivirus Money Content Filtering Private Cloud Downtime Vulnerability History Mouse Tablet Analytics Router Value Redundancy Memory Retail Search IT Support Office 365 Internet of Things Artificial Intelligence Networking Windows 10 Office Tips Hard Drives Humor IT Management Saving Time Statistics Work/Life Balance Facebook Document Management Online Currency DDoS Physical Security Outlook Unsupported Software Robot Printer Public Cloud Environment Flexibility Google Drive Phishing Current Events SaaS Administration Data Security Maintenance Identity Theft Entertainment Safety Running Cable Government Credit Cards Unified Threat Management Meetings Skype HaaS Mobile Office Fax Server Black Market Customer Relationship Management Law Enforcement Intranet Data Management Solid State Drive Best Available People Data Storage Internet Exlporer Programming Workers Word Data storage Network Congestion Trending Biometrics Business Intelligence Business Owner IT Consultant Apps OneNote Travel Reputation Wearable Technology End of Support Mobile Device Social Millennials User Wireless Charging Servers NarrowBand Company Culture Licensing Internet exploMicrosoft Windows 8.1 Update Samsung Customers IT Plan Twitter Best Practice Social Networking Root Cause Analysis Workforce Fiber-Optic Flash Chromecast Advertising Crowdfunding Analyitcs Software as a Service Patch Management Data loss Telecommuting Cables Sync Laptop Settings Distributed Denial of Service Update Scam Charger Software Tips Virtual Desktop Print Server Remote Work Human Resources Unified Communications Telephony Windows Media Player Touchpad IT service Hybrid Cloud Virtual Reality Google Docs Relocation Computer Care Uninterrupted Power Supply Training Theft Start Menu HIPAA Net Neutrality Hiring/Firing Domains Computer Repair IaaS Bloatware Spam Blocking Voice over Internet Protocol WIndows 7 Audit HBO Cleaning Customer Service Cortana Mobile Keyboard Entrepreneur Multi-Factor Security Managing Stress Screen Mirroring Frequently Asked Questions Tech Support Fraud Hacker Google Apps Professional Services Virus Touchscreen LinkedIn Cost Management Computer Fan Lifestyle Cast Tip of the week Shadow IT Applications Debate Amazon Science Infrastructure Tools Computer Accessories Wireless Files Streaming Media Password Instant Messaging FENG Data Protection Productivity Windows Server 2008 Wi-Fi Shortcut Amazon Web Services Video Surveillance Windows 8 Password Manager Cameras SharePoint Colocation Encryption Comparison Consultant Windows 7 Sports Education Bluetooth Online Shopping Tablets Botnet Printer Server Monitor Hosted Solution eWaste Computing Infrastructure Notifications Specifications Data Warehousing Evernote Regulations Worker Commute YouTube Piracy USB Recycling Emails Books CrashOverride IBM Webinar Emergency Worker Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Netflix Scalability Politics Transportation How to Users webinar PDF Benefits Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Techology Electronic Medical Records Public Computer Business Mangement Legal Employer Employee Relationship Data Breach Automobile