Your 1-Page Cybersecurity Cheat Sheet

Does the idea of cybersecurity strike fear into your heart? We know it’s not every business’ specialty, but that doesn’t make it any less important for companies like yours to consider. Today, we want to make it as easy as possible for your employees to practice appropriate cybersecurity measures, and that starts with a simple one-page cybersecurity cheat sheet.

Feel free to print this out, post it in a public place in your office, or send it to employees as needed.

3 Considerations for Network Security

The Golden Rule of Passwords

The simplest way to think about password security is: never reuse, and never share.

If you use the same password as your work-related accounts for your social media accounts, you are effectively putting the company’s data at risk. If a hacker were to crack your social media accounts or gain access to passwords in some other way (like a data breach or data leak), not only are your own accounts at risk, but so is the business. You should use the company-approved password manager; it’s there to help you optimize account security in the easiest and simplest way possible.

Remember, unique passwords should be unique; don’t reuse passwords under any circumstance.

Practice the S.T.O.P. Method

The most powerful security tool at your disposal is simply to stop and think.

Cybercriminals depend on this click-happy behavior, and they will send out emails that look an awful lot like shipping notifications, invoices, or other common documents. Instead of giving them what they want, you can combat their efforts with the S.T.O.P. framework:

  • S – Scrutinize the Sender – Does the email address match the name? Look for tiny typos or inconsistencies (for example, micr0soft.com instead of microsoft.com).
  • T – Think about the Ask – Is the person asking for passwords, money, or sensitive data? Chances are any legitimate sender will not do this.
  • O – Observe the Link – Before clicking on any link from any sender, you can hover over it with the mouse to “preview” the URL. Check the link to make sure it’s legitimate.
  • P – Phone a Friend – If the email feels off, or if there is a lot of urgency associated with the request, call the person or send them a message to verify their identity. In situations where you’re just not sure, send it to your IT resource for verification.

Take 2 minutes to think; it might just save the business from a ransomware attack or other dangerous cybersecurity threat.

Only Use Company-Approved Devices and Apps

It’s vital that you only use devices and applications provided by the company; otherwise, the risk of data exposure increases exponentially.

We understand you’re just trying to get work done in a more efficient way, but moving company data to off-network devices creates problems for data backups, encryption, cybersecurity, and operations in general. If you feel like you can get things done faster using a different device or software solution, ask IT. We are open to replacing older, slower tools with better, more efficient ones, but we need to do it in a way that doesn’t put data at risk.

Remember, we want to help you do your job, and we’re here to support you, so give us a call at (603) 889-0800 for a consultation.

Related Posts

Why a Reactive Cybersecurity Approach Is a Recipe for Disaster

Cyberthreats are no longer rare occurrences; they are constant, evolving, and frequently highly sophisticated. This reality makes a proactive approach to cybersecurity absolutely essential. Organizations that only react to attacks find themselves perpetually engaged in damage control. Failing to establish a deliberate, comprehensive cybersecurity strategy exposes any organization to repeated brea...

Three IT Obstacles that Crumble to Proactive Action

Technology is meant to be the wind in your business' sails, propelling you forward, simplifying tasks, and making operations smoother than a freshly paved highway, right? Sometimes, it is! Other times, it feels more like a mischievous gremlin has been let loose in the engine room, and certain seemingly small habits can escalate into full-blown operational nightmares. Here at White Mountain IT Services, we've se...

This Guy Scams the Scammers for a Living

When you think of a scammer, you probably think of someone looking to take advantage of someone for their own gain. While this isn’t wholly inaccurate, another variety exists to acknowledge… those who aim to scam the scammers. Let’s consider one such white-hat scammer, or “scam baiter,” a content creator who uses the alias “Kitboga,” Kit for short. Kitboga’s story is an interesting one: After ...

Why Data Privacy is Important and How You Can Make It a Priority

Since so much of the world is now online, businesses and organizations interact with people online now more than ever. This means they also collect people’s information, a practice they do for various reasons. Individuals need to consider their own data privacy and how it might be affected by business practices. Why Data Privacy is Important In short, data privacy is all about how much control...