Your 1-Page Cybersecurity Cheat Sheet

Does the idea of cybersecurity strike fear into your heart? We know it’s not every business’ specialty, but that doesn’t make it any less important for companies like yours to consider. Today, we want to make it as easy as possible for your employees to practice appropriate cybersecurity measures, and that starts with a simple one-page cybersecurity cheat sheet.

Feel free to print this out, post it in a public place in your office, or send it to employees as needed.

3 Considerations for Network Security

The Golden Rule of Passwords

The simplest way to think about password security is: never reuse, and never share.

If you use the same password as your work-related accounts for your social media accounts, you are effectively putting the company’s data at risk. If a hacker were to crack your social media accounts or gain access to passwords in some other way (like a data breach or data leak), not only are your own accounts at risk, but so is the business. You should use the company-approved password manager; it’s there to help you optimize account security in the easiest and simplest way possible.

Remember, unique passwords should be unique; don’t reuse passwords under any circumstance.

Practice the S.T.O.P. Method

The most powerful security tool at your disposal is simply to stop and think.

Cybercriminals depend on this click-happy behavior, and they will send out emails that look an awful lot like shipping notifications, invoices, or other common documents. Instead of giving them what they want, you can combat their efforts with the S.T.O.P. framework:

  • S – Scrutinize the Sender – Does the email address match the name? Look for tiny typos or inconsistencies (for example, micr0soft.com instead of microsoft.com).
  • T – Think about the Ask – Is the person asking for passwords, money, or sensitive data? Chances are any legitimate sender will not do this.
  • O – Observe the Link – Before clicking on any link from any sender, you can hover over it with the mouse to “preview” the URL. Check the link to make sure it’s legitimate.
  • P – Phone a Friend – If the email feels off, or if there is a lot of urgency associated with the request, call the person or send them a message to verify their identity. In situations where you’re just not sure, send it to your IT resource for verification.

Take 2 minutes to think; it might just save the business from a ransomware attack or other dangerous cybersecurity threat.

Only Use Company-Approved Devices and Apps

It’s vital that you only use devices and applications provided by the company; otherwise, the risk of data exposure increases exponentially.

We understand you’re just trying to get work done in a more efficient way, but moving company data to off-network devices creates problems for data backups, encryption, cybersecurity, and operations in general. If you feel like you can get things done faster using a different device or software solution, ask IT. We are open to replacing older, slower tools with better, more efficient ones, but we need to do it in a way that doesn’t put data at risk.

Remember, we want to help you do your job, and we’re here to support you, so give us a call at (603) 889-0800 for a consultation.

Related Posts

Why Overreacting to IT Troubles Makes Them Worse

You're in the middle of a crucial presentation, and suddenly, your screen freezes. Or perhaps your customer relationship management (CRM) system goes down during peak sales hours. Your first instinct might be to panic, to hit every button, or to call everyone you know. This month, we talk about how overreacting to your technology troubles can be just as bad as the troubles themselves.  Her...

Cyberattacks Are Real-Life Ghost Stories

What was the scariest Halloween costume you saw last week? Chances are we know something scarier—the cyberthreats that want to take your business down. Let’s go over some of the most common threats to your business’ future and what your business can do about them. Phishing Attacks One of the oldest tricks in the book is the phishing attack, where a hacker will try to trick you into handing ove...

4 Essential Cybersecurity Mistakes You Can't Afford to Make

When considering your company’s cybersecurity, it is important not to lose sight of the forest for the trees… or, in other words, not to forget the basics around which the rest of your protections are built. Let’s review four cybersecurity errors that could easily domino into larger catastrophes if not nipped in the bud. Not Training Employees Let me ask you this: Before you learned to tie yo...

The Single Biggest Step You Can Take to Secure Your Business Now: MFA

The scariest online threats are the ones you don't even see coming. Picture this: a hacker tricks one of your employees with a sneaky phishing email, steals their username and password, and just walks right into your network. No alarms, no warning.  The really good news is there's a simple fix that can make a huge difference: Multi-Factor Authentication (MFA). Just setting this up is one of ...