WRVBLaw Podcast

[Technology Law] Tips On Practicing Basic Cyber Hygiene by Jonathan Gallo

Episode Summary

In this episode, attorney Jonathan V. Gallo discusses some steps businesses can take to improve their cyber hygiene.

Episode Notes

Over the past few years, some of the largest and well-known companies have been affected by data breaches resulting in millions of dollars in losses.  Smaller businesses are not immune from data breaches, and even a small data breach impacting only a few thousand records can expose a business to significant losses and reputational damage that may have a devastating impact on its ability to function.  Various attack methods can be used against businesses to obtain sensitive data or access funds through fraud.  Some common attack methods are compromised credentials, social engineering attacks such as phishing, vishing, and smishing, business email compromise scams, ransomware, and vulnerabilities in third-party software.  While no business can expect to be 100% safe, here are some basic practices businesses can implement to improve their cyber hygiene.

1. Keep Software Updated

2. Use Strong Passwords/Passphrases

3. Use Multi-factor Authentication

4. Encrypt Devices

5. Backup Files

6. Secure Wireless Networks

7. Be Suspicious of Unexpected Emails, Phone Calls, and Text Messages

8. Limit Who Has Access to Sensitive Data By Implementing Least Privilege Access

9. Data Destruction

10. Develop an Information Security/Breach Response and Notification Plan

11. Business Continuity/Disaster Recovery Plan

12. Continuous Review

13. Training

Be sure to return to our website throughout October for additional information and resources to raise your business’s cybersecurity awareness and to help prepare for and respond to cyber-attacks.

Episode Transcription

Over the past few years, some of the largest and well-known companies have been affected by data breaches resulting in millions of dollars in losses.  Smaller businesses are not immune from data breaches, and even a small data breach impacting only a few thousand records can expose a business to significant losses and reputational damage that may have a devastating impact on its ability to function.  Various attack methods can be used against businesses to obtain sensitive data or access funds through fraud.  Some common attack methods are compromised credentials, social engineering attacks such as phishing, vishing, and smishing, business email compromise scams, ransomware, and vulnerabilities in third-party software.  While no business can expect to be 100% safe, here are some basic practices businesses can implement to improve their cyber hygiene.

1. Keep Software Updated

2. Use Strong Passwords/Passphrases

3. Use Multi-factor Authentication

4. Encrypt Devices

5. Backup Files

6. Secure Wireless Networks

7. Be Suspicious of Unexpected Emails, Phone Calls, and Text Messages

8. Limit Who Has Access to Sensitive Data By Implementing Least Privilege Access

9. Data Destruction

10. Develop an Information Security/Breach Response and Notification Plan

11. Business Continuity/Disaster Recovery Plan

12. Continuous Review

13. Training

Be sure to return to our website throughout October for additional information and resources to raise your business’s cybersecurity awareness and to help prepare for and respond to cyber-attacks. Contact Jonathan for more information.