Christmas is finally here and for many of us, our attention has turned to family and festivities as an unforgettable year comes to an end. Unfortunately, at this time of year, there are some that will turn their attention to you and your business.
We have put together our 12 days of Christmas but with a Cyber Security theme. We want to make sure that you and your business are ready to fend off any unwelcome visitors.
1st day of Christmas – Mimecast Email filtering
Mimecast’s cloud-based Secure Email Gateway protects organisations and employees using any cloud or on-premises email platform. It defends against inbound spear-phishing, malware, spam and zero-day attacks by combining innovative applications and policies with multiple detection engines and intelligence feeds.
2nd day of Christmas – Cybersecurity GAP Analysis
The Cybersecurity Gap Analysis provides organisations with the first steps in developing and maintaining an information security program. Using the results, Italik can help you develop a plan and define actionable tasks for correction to improve your overall cybersecurity. Italik can help you plan, design, and implement a secure wired network solution that meets the needs of your security policy while minimising the impact to your infrastructure, endpoints, and end-users.
3rd day of Christmas – Cisco Umbrella
Cisco Umbrella is an all in one, integrated cloud security service. As a leading provider of recursive DNS services, Cisco Umbrella also includes interactive threat intelligence, secure web gateway, firewall and cloud access security broker (CASB) functionality. Catering to business small and large, Umbrella offers three primary packages that provide increasingly more sophisticated capabilities for increased flexibility, visibility, and control.
4th day of Christmas – Cybersecurity Awareness Training
Cybersecurity Awareness Training is one of the key battles in the Cybersecurity war. The source of many security breaches can be put down to a lack of awareness and understanding of Cybersecurity. Continuous training of staff on topics such as password security & management, social engineering and email security can help your business remain protected.
5th day of Christmas – Vulnerability Scanning
Qualys is an application and vulnerability scanner that can provide in-depth and real-time information about your infrastructure. Having Qualys scan your system is the first step to finding hidden vulnerabilities, in all forms of your infrastructure. Being able to stop attackers in their tracks by fixing exploits that Qualys detects, ensures that you and your business are a lot safer as a result.
6th day of Christmas – Webroot Endpoint Protection
Webroot Endpoint Protection offers a revolutionary approach to malware protection. It brings together Webroot’s innovative file pattern and predictive behaviour recognition technology, with the almost limitless power of cloud computing, to stop known threats and prevent unknown zero-day attacks more effectively. Webroot protection is small, lightweight, and non-intrusive, meaning it does not sap resources from the client.
7th day of Christmas – Veeam Backup and Replication
Veeam offers industry leading backup software that is software-defined and hardware-agnostic, roughly translated, Veeam can backup almost anything, almost anywhere! With Veeam, you can ensure your data is backed up and recoverable with various backup and granular recovery options.
8th Day of Christmas – Paessler PRTG Monitoring
PRTG is a network monitoring tool allowing you to keep track of your systems, devices, traffic, and applications in your IT infrastructure. Everything is included with PRTG; there is no need for additional plugins or downloads. PRTG is a powerful and easy-to-use solution, which is suitable for businesses of all sizes.
9th day of Christmas – Multi-factor Authentication
Multi-factor Authentication (MFA) is an authentication method that requires the user to provide two or more verification elements to gain access to a resource such as an application, website, or a VPN. MFA is highly recommended, if available, on every account and login that you have. Having MFA enabled greatly decreases the likelihood of a successful attack. This form of authentication is on most applications and websites, whilst also built into software and services like Microsoft 365.
10th day of Christmas – Disaster Recovery and Business Continuity
If disaster strikes, you need to ensure that your IT infrastructure remains online for users. Following your disaster recovery or business continuity plan, a documented process or set of procedures developed specifically to ensure your core services remain. Having these plans in place will ensure that you and your business are prepared for any situation.
11th day of Christmas – Password Management
Having a password policy greatly increases the protection of user and service accounts within your business. It is a good idea to implement the following policies:
· Enforce Password History – will set how often an old password can be reused.
· Minimum Password Age – determines how long users must keep a password before they can change it.
· Minimum Password Length.
· Passwords must Meet Complexity Requirements.
12th day of Christmas – Software and System Updates
Ensuring that your software and services are kept up to date is vital. With the latest updates, you are benefitting from the latest patches and fixes which will put a stop to any vulnerability that had been previously detected.
We hope you stay safe over the holidays – Merry Christmas and a Happy New Year!