top of page

Cybersecurity Best Practices

Enable Two Factor Authentication (2FA)

Also called multiple-factor or multiple-step verification, it’s an

authentication mechanism to double check that your identity is

legitimate. It requires two verification factors, a password and a

second factor, usually an authenticator code on a mobile device

to login. This ensures that a hacker cannot gain access to your

account with only a password.

Virtual Private Network (VPN)

VPN encrypts your network traffic as it’s transported across

shared or public networks. This protects your data against

hackers who routinely monitor open networks for opportunities to

obtain passwords and critical data

Apply Updates

Always make sure your operating system and applications

are up-to-date with security patches and hot fixes. Microsoft

releases updates about once a month and it’s a very good

practice to keep current. If you have any computers running an

old operating system, such as Windows 7, upgrade it


Install a Firewall

A firewall is a network security device (or software) that monitors

incoming and outgoing network traffic and decides whether to

allow or block it, based on defined security rules. If you address

nothing else, implementing a firewall is perhaps the single most

effective thing a small business can do to decrease their risk of attack.

Enforce Strong Password Policies

Create rules that require passwords or pass-phrases that are at

least 10 characters long and contain a combination of letters,

numbers, special characters and upper & lower case. The more

complex your password, the harder it is for a hacker to find it.

Change the Default Router Password

Default router passwords are designed to be easily remembered

and readily available to installation technicians for quick setup.

Changing the router default password is similar to buying a house

and changing the locks.

Use Ethernet Instead of WiFi when Possible

In theory, wireless networks are less secure than an Ethernet

connection. Because wireless communication travels through the

air, it's easier for hackers to gain access to your data. Ethernet-based

connections are considered more secure, since there is a

direct connection between your data and the Internet.



bottom of page