MBS Techservices Inc. shares these cyber tips to assist you with identifying existing and potential threats and help with improving security of your business operations.
Contact us to learn about cyber vulnerability and how we can help
Defense Strategy for IT
• Implement in-depth defense: a layered defense strategy includes technical, organizational, and operational controls.
• Establish clear policies and procedures for employee use of your organization’s information technologies.
• Implement technical defenses: firewalls, intrusion detection systems, and Internet content filtering.
• Update your system’s anti-virus software daily.
• Regularly download vendor security "patches" for all of your software.
• Change the manufacturer's default passwords on all of your software.
• Monitor, log, analyze, and report successful and attempted intrusions to your systems and networks.
Cyber behaviour for employees
• Make your passwords complex. Use a combination of numbers, symbols, and letters (uppercase and lowercase).
• Change your passwords regularly (every 45 to 90 days).
• Do NOT give any of your usernames, passwords, or other computer or website access codes to anyone.
• Do NOT open emails, links, or attachments from strangers.
• Do NOT install or connect any personal software or hardware to your organization’s network without permission from your IT department.
• Make electronic and physical back-ups or copies of all your important work.
• Report all suspicious or unusual problems with your computer to your IT department.
Physical security vigilance
• Monitor and control who is entering your workplace: current employees, former employees, commercial delivery, and service personnel.
• Report broken doors, windows, and locks to your organization’s or building’s security personnel as soon as possible.
• Back up or copy sensitive and critical information and databases.
• Store, lock, and inventory your organization’s keys, access cards, uniforms, badges, and vehicles.
• Monitor and report suspicious activity in or near your facility’s entry/exit points, loading docks, parking areas, garages, and immediate vicinity.
• Report suspicious packages to your local police. DO NOT OPEN or TOUCH!
• Shred or destroy all documents that contain sensitive information
System Behaviour Monitoring
System Failure or Disruption
• Has your system or website’s availability been disrupted?
• Are your employees, customers, suppliers, or partners unable to access your system or website?
• Has your service been denied to its users?
• Are you aware of anyone attempting (either failed or successful) to gain unauthorized access to your system or data?
Unauthorized Changes or Additions
• Has anyone made unauthorized changes or additions to your system's hardware, firmware, or software characteristics without your IT department’s knowledge, instruction, or consent?
• Are unauthorized parties using your system for the processing or storage of data?
• Are former employees, customers, suppliers, or partners still using your system?