Do you know the five main components of cybersecurity?
Throughout the month of October, National Cybersecurity Month, we will be teaming up with Leeward Business Advisors, our Business IT Partner, to share information on our Greenwoods State Bank Facebook page about how to improve your cybersecurity. We will focus on trends to watch out for and how you can continue to guard against attacks.
According to the National Institute of Standards and Technology (NIST) Cybersecurity Framework, businesses of all sizes need a cybersecurity plan that addresses these five steps:
Identifying. Protecting. Detecting. Responding. Recovering
And these same five steps can be and should be applied at home as well, for personal computers, mobile devices, and/or smart devices.
No matter who you are, your medical records, banking information, personal data… all bring a pretty penny on the dark web.
Don’t just shut your front door, lock it, turn on the porch light, check all your windows and secure the key.
Don’t hit “later” when updates pop up. Is your computer performing differently than usual? Know what signs to watch for.
Suspected hacks or attacks should go immediately to the top of your to do list.
Do you have everything you need to get back to normal? Don’t risk losing what is valuable to you.
Five Main Components
Identifying – Know what others want. Too many people think they don’t have anything a hacker would go after.
Protecting – Make the path to your data full of roadblocks.
Detecting – Ignorance is not bliss. The sooner you know, the sooner you can respond.
Responding – Have a plan and beat the early bird.
Recovering – Have a spare key and build a better plan.
Hackers can sell your customers’ private information as well as shut down your business with ransomware.
Make sure all your endpoints are secure. Which employees are using their personal hardware or connecting to an unsecure site over your network?
Is all your hardware and software up to date with patches? If employees suspect something is wrong, who do they reach out to? Who is monitoring for attacks?
What is your action plan for a breach? Do your employees know that?
Is everything backed up? Do you have a PR plan? Did your action plan work, or does it need to be updated?
Please keep an eye out for our Cybersecurity Month posts!
If there are any topics you would like additional information on, or if there are different topics you would like us to share in future, please reach out to us at: email@example.com.