SlideShare a Scribd company logo
1 of 2
Download to read offline
Security must become a part of the organization’s culture.
Cyber security and profitability goals need to be closely aligned and clearly
communicated by elevating the conversation and educating staff about risks
affecting the business..
Evaluate and manage cyber security threats.
Identify critical assets and the financial, competitive, reputational and or
regulatory impact and exposure to the organization. Identify and develop
policies and strategies to manage cyber risks to an acceptable level.
Implement a risk based approach, compliance alone isn’t enough.
A risk based approach will produce a comprehensive and cost effective
management of cyber risks than compliance activities alone. Compliance
requirements help to establish a good cybersecurity baseline to address
known vulnerabilities.
Cybersecurity is NOT implementing a checklist of requirements – it’s day to
day policies and procedures that are the strategic framework of the
organization. Managing these threats is constant and ever changing.
Response Plans and Procedures.
Incident response plans must be tested regularly to enable timely response
and minimize potential damage. Identify strategic threats by analyzing,
aggregating, and integrating risk data from various sources and sharing
insights with partners in order to improve the security framework.
Many small businesses run a large part of their business
over the Internet without any security features. Being
online opens the door to potential risks and rewards. This
document provides an overview on how to protect your
organization’s information and networks in event of a
cyber-attack.
Simple safe steps are provided to educate your
staff about information security practices.
The SMLR Group is a full service
cyber security/risk assessment-
consulting firm, specializing
in: Privacy Audits, Standardized
Vendor Compliance Audits
(SVCA), Privacy Policies, Written
Information Security Plans, and
Data Breach Defensible Response
Consultation.
SMLR Group, Inc.
http://www.smlrgroup.com
Simple, Safe Steps to Cyber Security
Creating A Secure Network
SOURCE
The Department of Homeland
Security (DHS) is responsible
for safeguarding our Nation’s
critical infrastructure from
physical and cyber threats that
can affect our national security,
public safety, and economic
prosperity.
For more information, please
visit: www.dhs.gov/cyber.
To report a cyber incident:
https://forms.us-cert.gov/report/
or (888) 282-0870
SOURCE
The Department of Homeland
Security (DHS) is responsible
for safeguarding our Nation’s
critical infrastructure from
physical and cyber threats that
can affect our national security,
public safety, and economic
prosperity.
For more information, please
visit: www.dhs.gov/cyber.
To report a cyber incident:
https://forms.us-cert.gov/report/
or (888) 282-0870
Cyber threats constantly evolve with increasing intensity and
complexity potentially causing costly downtime to on going
business operations and supply chain. Compromised intellectual
property and customer data may result in reputational damage to
the organization’s credibility and trust.
BASIC STEPS TO CREATING A SECURE NETWORK
Antivirus software is a Must
Antivirus software detects and removes malware, including adware and
spyware, and filters out potentially dangerous downloads and emails.
Firewall Administrative Settings
Protect your network by restricting access to select websites. Configure
setting to block staff from sending proprietary data and specific types of
emails outside of your network. Administrative access should be limited to
key personnel and IT staff.
Create a Cyber Security Framework
Develop a clear security policy plan that designates which individuals have
access to which types of sensitive information. Provide clear direction as to
how staff and vendors must process critical proprietary and client data.
Back up Essential Data Every Day
Back up your organization’s data automatically, using a combination of
cloud and off-site backup.
Encrypt All Data
Encryption is essential to protecting personal identifiable information (PII).
Data is rendered useless without authorized access codes.
Update Wi-Fi Network
Wi-Fi Protected Access version 2 (WPA2) is widely recognized as the most
current and secure encryption available.
Mandate Security Polices for Mobile Devices
Remotely track devices SIM card, back up data and remotely lock devices
that are lost or stolen. Mandate employees create passwords for their
devices and report security breaches.
+
+
+
+
+
+
The SMLR Group is a full service
cyber security/risk assessment-
consulting firm, specializing
in: Privacy Audits, Standardized
Vendor Compliance Audits
(SVCA), Privacy Policies, Written
Information Security Plans, and
Data Breach Defensible Response
Consultation.
SMLR Group, Inc.
http://www.smlrgroup.com
Simple, Safe Steps to Cyber Security
Creating A Secure Network

More Related Content

What's hot

PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanPCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanTripwire
 
Application Security
Application SecurityApplication Security
Application Securityonenolesguy
 
Security Operations Center
Security Operations CenterSecurity Operations Center
Security Operations CenterMDS CS
 
Managed Cyber Security Services
Managed Cyber Security ServicesManaged Cyber Security Services
Managed Cyber Security ServicesMichael Bowers
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber SecurityLeon Fouche
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Tictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security ServicesTictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security ServicesTicTac Data Recovery
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainSanjay Chadha, CPA, CA
 
The July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk LandscapeThe July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk LandscapeCraig McGill
 
Cyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsCyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsWynyard Group
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?PECB
 
Gov & Education Day 2015 - Tim Lee, City of Los Angeles
Gov & Education Day 2015 - Tim Lee, City of Los AngelesGov & Education Day 2015 - Tim Lee, City of Los Angeles
Gov & Education Day 2015 - Tim Lee, City of Los AngelesSplunk
 
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101PECB
 
Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?PECB
 
Octree securapro mauleverer case study
Octree securapro mauleverer case studyOctree securapro mauleverer case study
Octree securapro mauleverer case studyTony Richardson CISSP
 

What's hot (18)

PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanPCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
 
Application Security
Application SecurityApplication Security
Application Security
 
Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)
 
Security Operations Center
Security Operations CenterSecurity Operations Center
Security Operations Center
 
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheetCylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
 
IT Security
IT SecurityIT Security
IT Security
 
Managed Cyber Security Services
Managed Cyber Security ServicesManaged Cyber Security Services
Managed Cyber Security Services
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Tictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security ServicesTictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security Services
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
 
The July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk LandscapeThe July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk Landscape
 
Cyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsCyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teams
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
 
Gov & Education Day 2015 - Tim Lee, City of Los Angeles
Gov & Education Day 2015 - Tim Lee, City of Los AngelesGov & Education Day 2015 - Tim Lee, City of Los Angeles
Gov & Education Day 2015 - Tim Lee, City of Los Angeles
 
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101
 
Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?
 
Octree securapro mauleverer case study
Octree securapro mauleverer case studyOctree securapro mauleverer case study
Octree securapro mauleverer case study
 

Viewers also liked (9)

IABC Porfolio Rebuilding Together
IABC Porfolio Rebuilding Together IABC Porfolio Rebuilding Together
IABC Porfolio Rebuilding Together
 
MobileSecurity WhitePaper
MobileSecurity WhitePaperMobileSecurity WhitePaper
MobileSecurity WhitePaper
 
Content Marketing
Content Marketing Content Marketing
Content Marketing
 
Guide to content marketing
Guide to content marketingGuide to content marketing
Guide to content marketing
 
Social mediamarketing hvpr
Social mediamarketing hvprSocial mediamarketing hvpr
Social mediamarketing hvpr
 
Branding Your Business
Branding Your BusinessBranding Your Business
Branding Your Business
 
Stakeholder Assessment ByteBack NGO
Stakeholder Assessment ByteBack NGO Stakeholder Assessment ByteBack NGO
Stakeholder Assessment ByteBack NGO
 
Colloque "La disparition des abeilles"
Colloque "La disparition des abeilles" Colloque "La disparition des abeilles"
Colloque "La disparition des abeilles"
 
Creating an Actionable Roadmap for Company Growth
Creating an Actionable Roadmap for Company Growth Creating an Actionable Roadmap for Company Growth
Creating an Actionable Roadmap for Company Growth
 

Similar to Simple Safe Steps to Cyber Security

Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadsavassociates1
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfJustinBrown267905
 
Cybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness AssessmentCybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness AssessmentCBIZ, Inc.
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideInspiring Women
 
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...Precise Testing Solution
 
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023CBIZ, Inc.
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber securitySAHANAHK
 
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Richard Lawson
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingDanielle Bowers
 
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdfAfour tech
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowShantam Goel
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Software
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityRahul Tyagi
 

Similar to Simple Safe Steps to Cyber Security (20)

Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
Cybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness AssessmentCybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness Assessment
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
CCA study group
CCA study groupCCA study group
CCA study group
 
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
 
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
 
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, Entreda
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Cyber Security | Information Security
Cyber Security  | Information SecurityCyber Security  | Information Security
Cyber Security | Information Security
 
Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe Security
 

More from Hudson Valley Public Relations

More from Hudson Valley Public Relations (19)

Register Herald, Pine Plains NY September 2, 2004
Register Herald, Pine Plains NY September 2, 2004Register Herald, Pine Plains NY September 2, 2004
Register Herald, Pine Plains NY September 2, 2004
 
Us Role in Israeli Conflict White Paper
Us Role in Israeli Conflict White PaperUs Role in Israeli Conflict White Paper
Us Role in Israeli Conflict White Paper
 
Interpretive turmoil and enduring values
Interpretive turmoil and enduring valuesInterpretive turmoil and enduring values
Interpretive turmoil and enduring values
 
White paper blurring boundaries
White paper blurring boundariesWhite paper blurring boundaries
White paper blurring boundaries
 
Content graphics
Content graphicsContent graphics
Content graphics
 
Freedoms forsaken
Freedoms forsakenFreedoms forsaken
Freedoms forsaken
 
Is Negative Campaigning Effective?
Is Negative Campaigning Effective?Is Negative Campaigning Effective?
Is Negative Campaigning Effective?
 
White paper blurring boundaries
White paper blurring boundariesWhite paper blurring boundaries
White paper blurring boundaries
 
RTDC Media Advisory Charity Event
RTDC Media Advisory Charity EventRTDC Media Advisory Charity Event
RTDC Media Advisory Charity Event
 
Level the Competition
Level the CompetitionLevel the Competition
Level the Competition
 
Resident magazine
Resident magazineResident magazine
Resident magazine
 
Visit the Berkshires Blog Page
Visit the Berkshires Blog PageVisit the Berkshires Blog Page
Visit the Berkshires Blog Page
 
Hilltop House Brochure
Hilltop House BrochureHilltop House Brochure
Hilltop House Brochure
 
Pg2 approved golf brochure
Pg2 approved golf brochurePg2 approved golf brochure
Pg2 approved golf brochure
 
Pg1 Rebuilding Together Golf Brochure
Pg1 Rebuilding Together Golf BrochurePg1 Rebuilding Together Golf Brochure
Pg1 Rebuilding Together Golf Brochure
 
Hilltop House Press Release
Hilltop House Press ReleaseHilltop House Press Release
Hilltop House Press Release
 
Tulip post card
Tulip post cardTulip post card
Tulip post card
 
Innovation
InnovationInnovation
Innovation
 
E marketing webdesign seo socialmedia
E marketing webdesign  seo socialmediaE marketing webdesign  seo socialmedia
E marketing webdesign seo socialmedia
 

Simple Safe Steps to Cyber Security

  • 1. Security must become a part of the organization’s culture. Cyber security and profitability goals need to be closely aligned and clearly communicated by elevating the conversation and educating staff about risks affecting the business.. Evaluate and manage cyber security threats. Identify critical assets and the financial, competitive, reputational and or regulatory impact and exposure to the organization. Identify and develop policies and strategies to manage cyber risks to an acceptable level. Implement a risk based approach, compliance alone isn’t enough. A risk based approach will produce a comprehensive and cost effective management of cyber risks than compliance activities alone. Compliance requirements help to establish a good cybersecurity baseline to address known vulnerabilities. Cybersecurity is NOT implementing a checklist of requirements – it’s day to day policies and procedures that are the strategic framework of the organization. Managing these threats is constant and ever changing. Response Plans and Procedures. Incident response plans must be tested regularly to enable timely response and minimize potential damage. Identify strategic threats by analyzing, aggregating, and integrating risk data from various sources and sharing insights with partners in order to improve the security framework. Many small businesses run a large part of their business over the Internet without any security features. Being online opens the door to potential risks and rewards. This document provides an overview on how to protect your organization’s information and networks in event of a cyber-attack. Simple safe steps are provided to educate your staff about information security practices. The SMLR Group is a full service cyber security/risk assessment- consulting firm, specializing in: Privacy Audits, Standardized Vendor Compliance Audits (SVCA), Privacy Policies, Written Information Security Plans, and Data Breach Defensible Response Consultation. SMLR Group, Inc. http://www.smlrgroup.com Simple, Safe Steps to Cyber Security Creating A Secure Network SOURCE The Department of Homeland Security (DHS) is responsible for safeguarding our Nation’s critical infrastructure from physical and cyber threats that can affect our national security, public safety, and economic prosperity. For more information, please visit: www.dhs.gov/cyber. To report a cyber incident: https://forms.us-cert.gov/report/ or (888) 282-0870
  • 2. SOURCE The Department of Homeland Security (DHS) is responsible for safeguarding our Nation’s critical infrastructure from physical and cyber threats that can affect our national security, public safety, and economic prosperity. For more information, please visit: www.dhs.gov/cyber. To report a cyber incident: https://forms.us-cert.gov/report/ or (888) 282-0870 Cyber threats constantly evolve with increasing intensity and complexity potentially causing costly downtime to on going business operations and supply chain. Compromised intellectual property and customer data may result in reputational damage to the organization’s credibility and trust. BASIC STEPS TO CREATING A SECURE NETWORK Antivirus software is a Must Antivirus software detects and removes malware, including adware and spyware, and filters out potentially dangerous downloads and emails. Firewall Administrative Settings Protect your network by restricting access to select websites. Configure setting to block staff from sending proprietary data and specific types of emails outside of your network. Administrative access should be limited to key personnel and IT staff. Create a Cyber Security Framework Develop a clear security policy plan that designates which individuals have access to which types of sensitive information. Provide clear direction as to how staff and vendors must process critical proprietary and client data. Back up Essential Data Every Day Back up your organization’s data automatically, using a combination of cloud and off-site backup. Encrypt All Data Encryption is essential to protecting personal identifiable information (PII). Data is rendered useless without authorized access codes. Update Wi-Fi Network Wi-Fi Protected Access version 2 (WPA2) is widely recognized as the most current and secure encryption available. Mandate Security Polices for Mobile Devices Remotely track devices SIM card, back up data and remotely lock devices that are lost or stolen. Mandate employees create passwords for their devices and report security breaches. + + + + + + The SMLR Group is a full service cyber security/risk assessment- consulting firm, specializing in: Privacy Audits, Standardized Vendor Compliance Audits (SVCA), Privacy Policies, Written Information Security Plans, and Data Breach Defensible Response Consultation. SMLR Group, Inc. http://www.smlrgroup.com Simple, Safe Steps to Cyber Security Creating A Secure Network