Cybersecurity Best Practices
Enable Two Factor Authentication (2FA)
Also called multiple-factor or multiple-step verification, it’s an
authentication mechanism to double check that your identity is
legitimate. It requires two verification factors, a password and a
second factor, usually an authenticator code on a mobile device
to login. This ensures that a hacker cannot gain access to your
account with only a password.
Virtual Private Network (VPN)
VPN encrypts your network traffic as it’s transported across
shared or public networks. This protects your data against
hackers who routinely monitor open networks for opportunities to
obtain passwords and critical data
Always make sure your operating system and applications
are up-to-date with security patches and hot fixes. Microsoft
releases updates about once a month and it’s a very good
practice to keep current. If you have any computers running an
old operating system, such as Windows 7, upgrade it
Install a Firewall
A firewall is a network security device (or software) that monitors
incoming and outgoing network traffic and decides whether to
allow or block it, based on defined security rules. If you address
nothing else, implementing a firewall is perhaps the single most
effective thing a small business can do to decrease their risk of attack.
Enforce Strong Password Policies
Create rules that require passwords or pass-phrases that are at
least 10 characters long and contain a combination of letters,
numbers, special characters and upper & lower case. The more
complex your password, the harder it is for a hacker to find it.
Change the Default Router Password
Default router passwords are designed to be easily remembered
and readily available to installation technicians for quick setup.
Changing the router default password is similar to buying a house
and changing the locks.
Use Ethernet Instead of WiFi when Possible
In theory, wireless networks are less secure than an Ethernet
connection. Because wireless communication travels through the
air, it's easier for hackers to gain access to your data. Ethernet-based
connections are considered more secure, since there is a
direct connection between your data and the Internet.